query_id
stringlengths
32
32
query
stringlengths
7
4.32k
positive_passages
listlengths
1
1
negative_passages
listlengths
88
101
e238d47df3d1fdea43fdbc9ca363c3d2
init for getting command line arguments
[ { "docid": "827dedab580bcf03fcb24b8de4e008f4", "score": "0.63859963", "text": "func init() {\n\tflag.Usage = usage\n\ttimeDuration = flag.Int(\"duration\", 5, \"time duration for which server should be run\")\n\tflag.Parse()\n}", "title": "" } ]
[ { "docid": "ed87fa700c61e5f2b4b7eb7396389dec", "score": "0.74075615", "text": "func argsInit() {\n\tArgs = make([]string, 0, 0)\n\tArgs = append(Args, os.Args...)\n\tExecFile = getopt.ExecFileOfPid(os.Getpid())\n\tArgLine = getopt.ArgsToSpLine(Args)\n\tArgFullLine = getopt.CleanArgLine(os.Args[0] + \" \" + opts.String())\n\t//\n}", "title": "" }, { "docid": "87320160d8e557c1b2b296cd9a199cf5", "score": "0.73806965", "text": "func initArgs() {\n\t// master -config /master.json\n\tflag.StringVar(&confFile,\"config\",\"./config.json\",\"请指定config.json\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "c73648b39d750c27f49e16b01151d1ee", "score": "0.73367655", "text": "func (app *App) init() error {\n\t// Application Defaults\n\tapp.CommandActive = \"default\" // Command\n\tvar index_start int = 1\n\n\tif len(os.Args) > 1 &&\n\t\t!strings.HasPrefix(os.Args[1], \"-\") &&\n\t\t!strings.HasPrefix(os.Args[1], \"--\") {\n\t\tapp.CommandActive = os.Args[1]\n\t\tindex_start = 2\n\t}\n\n\tif _, ok := app.Commands[app.CommandActive]; !ok {\n\t\treturn app.handleError(100)\n\t}\n\n\t// Parse Arguments\n\tflags := make(map[string]bool)\n\toptions := make(map[string]string)\n\tvar arguments []string\n\n\tif len(os.Args) < index_start {\n\t\treturn nil\n\t}\n\n\tfor _, arg := range os.Args[index_start:] {\n\t\t// Options\n\t\tif strings.Index(arg, \"--\") == 0 {\n\t\t\tif len(arg) == 2 {\n\t\t\t\treturn app.handleError(101)\n\t\t\t}\n\n\t\t\toption := strings.TrimLeft(arg, \"--\")\n\n\t\t\tif strings.Index(arg, \"=\") == -1 {\n\t\t\t\treturn app.handleError(102, option)\n\t\t\t}\n\n\t\t\tequals_index := strings.Index(option, \"=\")\n\t\t\tkey := option[:equals_index]\n\t\t\tvalue := option[equals_index+1:]\n\n\t\t\tif len(value) == 0 {\n\t\t\t\treturn app.handleError(102, key)\n\t\t\t}\n\n\t\t\toptions[key] = value\n\n\t\t\t// Flags\n\t\t} else if strings.Index(arg, \"-\") == 0 {\n\t\t\tif len(arg) == 1 {\n\t\t\t\treturn app.handleError(103)\n\t\t\t}\n\n\t\t\tkey := strings.TrimLeft(arg, \"-\")\n\t\t\tflags[key] = true\n\n\t\t\t// Arguments\n\t\t} else {\n\t\t\targuments = append(arguments, arg)\n\t\t}\n\t}\n\n\tapp.Flags = flags\n\tapp.Options = options\n\tapp.Arguments = arguments\n\n\treturn nil\n}", "title": "" }, { "docid": "702e852951ff5521b8bb437ca600f1f8", "score": "0.7318212", "text": "func init() {\n\tRootCmd.AddCommand(startCmd)\n\n\t//startCmd.Flags().StringVar(&arguments.path, \"path\", \"\", \"path to execute\")\n\t//startCmd.Flags().StringSliceVar(&arguments.argv, \"cmd\", arguments.argv, \"arguments\")\n}", "title": "" }, { "docid": "04a132dfac70c30af8371d1b6d25de0f", "score": "0.71395284", "text": "func init_args() error {\n\tvar result error \n\tDUMMYBOARD = flag.Bool(\"d\", false, \"Use a dummy board\")\n\tflag.Parse()\n\treturn result\t\n}", "title": "" }, { "docid": "a5b3ffc258ddd154614c45594a90c64f", "score": "0.70354205", "text": "func init() {\n\n\t// cmdLine = flag.NewFlagSet(\"\", flag.ExitOnError)\n\t// cmdLine.Usage = func() {\n\t// \tfmt.Fprintf(os.Stderr, \"Usage of %s:\\n\", \"question\")\n\t// }\n\t// question = cmdLine.String(\"question\", \"good question\", \"Usage of Question\")\n\n\tflag.CommandLine = flag.NewFlagSet(\"\", flag.PanicOnError)\n\tflag.CommandLine.Usage = func() {\n\t\tfmt.Fprintf(os.Stderr, \"Usage of %s:\\n\", \"name\")\n\t\tflag.PrintDefaults()\n\t}\n\n\t//flag.StringVar(&name, \"name\", \"ybq\", \"print name of author by flag.StringVar.\")\n\tname = flag.String(\"name\", \"ybq\", \"Usage of print name of author by flag.String.\")\n}", "title": "" }, { "docid": "f04b7a8f0822b6a5d9113ed9581e0eba", "score": "0.67962", "text": "func init() {\n\tflag.Usage = usage\n\tflag.Parse()\n\n\tif *help {\n\t\tusage()\n\t\tos.Exit(0)\n\t}\n\n\tvar dir = flag.Arg(0)\n\tif dir != \"\" {\n\t\tstartdir = dir\n\t}\n}", "title": "" }, { "docid": "fe52e9f5e299e38660286266143c360c", "score": "0.67586356", "text": "func init() {\n\tflag.StringVar(&cfg.ConfigFile, \"c\", cfg.ConfigFile, \"load configuration from `FILE`\")\n\tflag.BoolVar(&cliParams.Verbose, \"v\", false, \"verbose output\")\n\tflag.BoolVar(&cliParams.HtmlOutput, \"html\", false, \"render results to HTML output and open it with default browser\")\n\tflag.Usage = usage\n}", "title": "" }, { "docid": "64b77a744d000f59741e0ec2054f6aa6", "score": "0.67517155", "text": "func init() {\n\tflag.BoolVar(&localfile, \"f\", false, \"read from local files\")\n\tflag.BoolVar(&postlink, \"p\", false, \"link to original post\")\n\tflag.IntVar(&ncols, \"nc\", 5, \"number of columns\")\n\tflag.IntVar(&gutter, \"g\", 5, \"gutter (pixels)\")\n\tflag.IntVar(&thumbwidth, \"tw\", 75, \"thumbnail width\")\n\tflag.IntVar(&piclimit, \"n\", 30, \"picture limit\")\n\tflag.StringVar(&filtertag, \"tag\", \"\", \"filter tag\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "bacd8c3ebc2c4c50787e6d5d11efb085", "score": "0.6737345", "text": "func init() {\n\tflag.BoolVar(&debug, \"d\", debug, \"Display debugging information\")\n\tflag.StringVar(&filename, \"f\", filename, \"Specify a file to read input from\")\n\tflag.BoolVar(&timing, \"t\", timing, \"Display timing information\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "ef2cf6854e46d2eea3a9214348be95c3", "score": "0.66922075", "text": "func init() {\n\tRootCmd.AddCommand(reportCmd)\n\tbamFile = reportCmd.Flags().String(\"bamFile\", \"\", \"BAM file generated by groot alignment (will use STDIN if not provided)\")\n\tcovCutoff = reportCmd.Flags().Float64P(\"covCutoff\", \"c\", 0.97, \"coverage cutoff for reporting ARGs\")\n\tlowCov = reportCmd.Flags().Bool(\"lowCov\", false, \"reports ARGs which don't have 5' or 3' coverage (overrides -c option)\")\n}", "title": "" }, { "docid": "87c421890ba40022b6c475faf837a9b1", "score": "0.6666861", "text": "func init() {\n\tflag.String(\"app\", \"\", \"app name\")\n\tflag.String(\"ver\", \"\", \"ver name\")\n\tflag.String(\"webhost\", \"\", \"webhost content\")\n\tflag.String(\"tcphost\", \"\", \"tcphost content\")\n\tflag.String(\"pprof\", \"\", \"pprof content\")\n\tflag.Int(\"log\", 0, \"log content\")\n\tflag.Int(\"clients\", 1, \"clients content\")\n\n\tflag.Parse()\n}", "title": "" }, { "docid": "4336b393b132d813e692cc0510ecd4c1", "score": "0.6653094", "text": "func init() {\n\tRootCmd.AddCommand(MusicCmd)\n\tMusicCmd.AddCommand(SearchByProxyCmd, SearchByTextCmd, SearchResumeCmd, SearchBySoundCmd, DownloadCmd)\n\n\tSearchByProxyCmd.Flags().String(FlagFilePath, \"\", \"\")\n\tSearchBySoundCmd.Flags().String(FlagFilePath, \"\", \"\")\n\tSearchByTextCmd.Flags().String(FlagKeyword, \"\", \"\")\n\tDownloadCmd.Flags().String(FlagSongID, \"\", \"\")\n\tDownloadCmd.Flags().String(FlagFilePath, \"./song.mp3\", \"\")\n}", "title": "" }, { "docid": "86b3f082bd0549df608456ea8ab2285c", "score": "0.66488224", "text": "func init() {\n\t// Attach all commands\n\trootCmd.AddCommand(scanCmd)\n\trootCmd.AddCommand(versionCmd)\n\n\t// Hydrate scanCmd flag variables with the (if any) user input\n\tscanCmd.Flags().StringVarP(\n\t\t&Ports,\n\t\t\"ports\",\n\t\t\"p\",\n\t\t\"1-1024\",\n\t\t\"choose port numbers to scan\",\n\t)\n}", "title": "" }, { "docid": "35d53a6bf4f9b1dde9c19566226aa140", "score": "0.664369", "text": "func init() {\n\tmessage := []byte(\"Usage: md2web <url> <port:int>\\n\")\n\tif len(os.Args) != 3 {\n\t\tlog.Fatal(message)\n\t}\n\thost = os.Args[1]\n\tportArg := os.Args[2]\n\tportVal, err := strconv.Atoi(portArg)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tport = portVal\n}", "title": "" }, { "docid": "6c8004d9708f453849b8815ceba90358", "score": "0.66328543", "text": "func init() {\n\tif len(os.Args) == 2 {\n\t\targ := os.Args[1]\n\t\tif runtime.GOOS == \"windows\" {\n\t\t\tif arg == \"/?\" {\n\t\t\t\targ = \"-h\"\n\t\t\t} else {\n\t\t\t\targ = regexp.MustCompile(\"[/]\").ReplaceAllString(arg, \"-\")\n\t\t\t}\n\t\t}\n\t\tswitch arg {\n\t\tcase \"-h\", \"--help\":\n\t\t\thelp()\n\t\t\tp(\"%s\\n\", bs())\n\t\t\tos.Exit(0)\n\t\tcase \"-v\", \"--version\":\n\t\t\tbt(\"%s %s (%s-%s/%s)\\n\", app, ver, runtime.Compiler, runtime.GOARCH, runtime.GOOS)\n\t\t\tcopyright()\n\t\t\tp(\"%s\\n\", bs())\n\t\t\tos.Exit(0)\n\t\tcase \"--sample\":\n\t\t\t// run a loop to display sample results of all units\n\t\t\tunitDump := symbols.UnitData()\n\t\t\t// sort units by key name\n\t\t\tmapofUnits := make([]string, 0, len(unitDump))\n\t\t\tfor unitItem := range unitDump {\n\t\t\t\tmapofUnits = append(mapofUnits, unitItem)\n\t\t\t}\n\t\t\tsort.Strings(mapofUnits)\n\t\t\tfor i, _ := range mapofUnits {\n\t\t\t\tu := mapofUnits[i]\n\t\t\t\teg := fmt.Sprint(\"100\", u)\n\t\t\t\tbt(\"\\n[%s] results from \\\"%v\\\"\\n\", symbols.Proper(u), eg)\n\t\t\t\tm, x, _ := input([]string{\"place-holder\", eg})\n\t\t\t\tprocess(m, x)\n\t\t\t\tbt(\"\\n\")\n\t\t\t}\n\t\t\tp(\"%s\\n\", bs())\n\t\t\tos.Exit(0)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "78e3dc2474fc1692e22470ef8f215be0", "score": "0.66019183", "text": "func init() {\n\tflag.BoolVar(&options.help, \"help\", false, \"Enter the number of posts you would love to see\")\n\tflag.BoolVar(&options.show_templates, \"show\", false, \"Shows the templates you have avaliable\")\n\tflag.StringVar(&options.batch, \"batch\", \"\", \"expect many templates\")\n\tflag.StringVar(&options.template_name, \"template\", \"\", \"name of the template you want generated\")\n\tflag.StringVar(&options.path, \"path\", \"\", \"path other than working directory, if non empty this path will be used instead of working directory\")\n\tflag.StringVar(&options.name, \"name\", \"\", \"custom name for genrated file\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "57ec681cb498c8f3b9f43172c9439ef4", "score": "0.6589554", "text": "func init() {\n\tmainCmd.PersistentFlags().StringVarP(\n\t\t&mainCmdConfigFlag,\n\t\t\"config\",\n\t\t\"c\",\n\t\t\"\",\n\t\t\"Absolute path to configuration file\")\n}", "title": "" }, { "docid": "2759aca322c521992d1f56a69a328238", "score": "0.65666664", "text": "func init() {\n\tflag.StringVar(&opts.SiteRoot, \"r\", \"\", \"root folder of the static website to serve\")\n\tflag.IntVar(&opts.Port, \"p\", 8080, \"web server port to listen on\")\n\tflag.BoolVar(&opts.Version, \"v\", false, \"show version info and exit\")\n\tflag.Parse()\n\n\tif opts.Version {\n\t\tprintVersion()\n\t\tos.Exit(0)\n\t}\n}", "title": "" }, { "docid": "8796543aacab013bb9de609da85b0e99", "score": "0.6539739", "text": "func init() {\n\tif (len(os.Args) != 2) {\n\t\tlog.Fatal(\"The config file (ABSOLUTE PATH + FILE NAME) must be the only command line arguement\")\t\n\t}\n\t// read config\n\terr := getConfiguration(os.Args[1])\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\t\n\t\n\t// Initialize logging\n\terr = initializeLogging()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\t\n}", "title": "" }, { "docid": "3a890fd8bb290649a9ed8e7e9dfaf4f2", "score": "0.65286434", "text": "func initCLIArgs() ConfigCLI {\n\tconfig := ConfigCLI{}\n\t// informational args\n\tflag.Usage = printHelp\n\tflag.StringVar(&config.DatabaseFile, \"database\", \"data/transaction.db\", \"the sqlite3 file that contains the transactions\")\n\t// date/time args\n\tdefaultInterval := time.Duration(3) * time.Hour * 24\n\tflag.StringVar(&config.StartDate, \"start-date\", \"\", \"the first date to include the display\")\n\tflag.StringVar(&config.EndDate, \"end-date\", \"\", \"the last date to include the display\")\n\tflag.DurationVar(&config.Interval, \"time-slice\", defaultInterval, \"the interval at which to aggregate disparate data points for graphing. accepts any format parsable by time.ParseDuration\")\n\t// performance args\n\tflag.IntVar(&config.MaxBufferedTransactions, \"max-buffer\", 5000, \"the maximum number of transactions to buffer in memory while reading CSV entries\")\n\t// Output args\n\tflag.StringVar(&config.OutputDirectory, \"out\", \"output\", \"the directory in which to save output\")\n\tflag.StringVar(&config.GraphTypes, \"graphs\", \"\", \"the comma-delimited list of graphs to create\")\n\tflag.StringVar(&config.Categories, \"category\", \"\", \"the list of categories to include in the analysis\")\n\t// helper args\n\tflag.BoolVar(&config.Version, \"version\", false, \"print version information and exit\")\n\tflag.Parse()\n\tconfig.CSV = flag.Args()\n\treturn config\n}", "title": "" }, { "docid": "4019b80f282e4247fb693b063cd7e698", "score": "0.6522657", "text": "func init() {\n\tconst (\n\t\trecursiveDefault = false\n\t\trecursiveDescription = \"Trawl files recursively if true, iteratively if not.\"\n\n\t\tpathDefault = \"/\"\n\t\tpathDescription = \"Root directory to begin file listing\"\n\n\t\toutputDefault = \"text\"\n\t\toutputDescription = \"Accepts 3 arguments, json|yaml|text.\"\n\t)\n\tconfig = &Config{}\n\tflag.BoolVar(&config.Recursive, \"recursive\", recursiveDefault, recursiveDescription)\n\n\tflag.StringVar(&config.Path, \"path\", pathDefault, pathDescription)\n\n\tflag.StringVar(&config.Output, \"output\", outputDefault, outputDescription)\n}", "title": "" }, { "docid": "8b1861ee8351590942fcc65d7cfa8d6a", "score": "0.6515138", "text": "func init() {\n\tflag.StringVar(&cfg.device, \"i\", \"\", \"interface to open\")\n\tflag.StringVar(&cfg.infile, \"r\", \"\", \"file to read from\")\n\tflag.IntVar(&cfg.snaplen, \"s\", 65535, \"snaplen, defaults to 65535\")\n\tflag.BoolVar(&cfg.log,\"v\",false,\"verbose logging\")\n\tflag.BoolVar(&cfg.hexlog,\"h\",false,\"hex logging\")\n}", "title": "" }, { "docid": "6c09f40421a497a3f5c11e4ad8782137", "score": "0.65067095", "text": "func init() {\n\tflag.Usage = Usage\n\tflag.Parse()\n}", "title": "" }, { "docid": "4f00fcbeb6d8ea7e9c968a77815ccb97", "score": "0.6495593", "text": "func Args() []string { return CommandLine.args }", "title": "" }, { "docid": "4f00fcbeb6d8ea7e9c968a77815ccb97", "score": "0.6495593", "text": "func Args() []string { return CommandLine.args }", "title": "" }, { "docid": "02349334778854f15e35e593ab592bf4", "score": "0.6468985", "text": "func init() {\n host = flag.String(`H`, `0.0.0.0`, `Host binding address`)\n logstashHost = flag.String(`LH`, `0.0.0.0`, `Logstash Host`)\n port = flag.Int(`P`, 9001, `Host binding port`)\n staticPath = flag.String(`STATIC_PATH`, defaultStaticPath, `Webserver static path`)\n\n flag.Parse()\n}", "title": "" }, { "docid": "e854f8b066fea7a04da3579cdddff23d", "score": "0.6461071", "text": "func init() {\n\tflag.BoolVar(&dryRun, \"dry-run\", true, \"Whether or not to execute the download\")\n\tflag.StringVar(&repo, \"repo\", \"\", \"The Github repository name\")\n\tflag.StringVar(&user, \"user\", \"\", \"The Github user\")\n\tflag.StringVar(&dir, \"dir\", \"\", \"The sub directory to fetch\")\n}", "title": "" }, { "docid": "d434aa9be38730ae5a0582f2d2add4e6", "score": "0.64562017", "text": "func init() {\n\trootCmd.AddCommand(startCmd)\n\n\t// Add flags and mark as required\n\tstartCmd.PersistentFlags().String(flagInFile, \"./assets/small_world.txt\", \"Path to start file\")\n\tstartCmd.PersistentFlags().Int(flagNumberAliens, 10, \"Number of aliens participating in the invasion\")\n\tstartCmd.PersistentFlags().Bool(flagAdvancedTech, false, \"Determines the alien army's technical capabilities\")\n\tstartCmd.MarkFlagRequired(flagInFile)\n\tstartCmd.MarkFlagRequired(flagNumberAliens)\n\tstartCmd.MarkFlagRequired(flagAdvancedTech)\n\n\t// Bind flags\n\tviper.BindPFlag(flagInFile, startCmd.Flag(flagInFile))\n\tviper.BindPFlag(flagNumberAliens, startCmd.Flag(flagNumberAliens))\n\tviper.BindPFlag(flagAdvancedTech, startCmd.Flag(flagAdvancedTech))\n}", "title": "" }, { "docid": "dec1a38b630bf20ee967609b85ae7663", "score": "0.6448049", "text": "func init() {\n\tconfigFile = flag.String(constants.File, constants.DefaultConfig, constants.FileUsage)\n}", "title": "" }, { "docid": "ca1f08ec4930a6a20b90492fac3b9cac", "score": "0.64474946", "text": "func init() {\n\tflag.StringVar(&DorkFile, \"dork\", \"dorks.txt\", \"Path of your dork file!\")\n\tflag.StringVar(&DenyFile, \"deny\", \"deny.txt\", \"Path of your deny file!\")\n\tflag.BoolVar(&Concurrency, \"turbo\", true, \"Concurrectly searches dorks. Turn it off (-turbo=false) if you have a lot of dorks and time.\")\n\tflag.BoolVar(&JSON, \"json\", false, \"json output in every api endpoint\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "6b083e4598aa48a90094a8a7f29d1aae", "score": "0.6433659", "text": "func init() {\n\tflag.StringVar(&token, \"token\", \"\", \"Telegram bot token\")\n\tflag.StringVar(&channelName, \"channel\", \"\", \"Telegram channel name (with @)\")\n\n\tflag.Parse()\n}", "title": "" }, { "docid": "2a94d00cc1d6af44ace9e4f5217dbce3", "score": "0.6427748", "text": "func init() {\n log.SetFlags(log.Lshortfile)\n\n log.Printf(\"Welcome to Sumanta's Supply Chain Dashboard Server!\")\n listenPort = flag.Int(\"port\", 8080, \"mux server listen port\")\n totalLocs = flag.Int(\"locs\", 6, \"total locations in supply chain\")\n dataDir = flag.String(\"data\", \"data\", \"pathname of data directory\")\n flag.Parse()\n\n LoadProductData() // load from existing files, if any\n}", "title": "" }, { "docid": "b4596f851098a89d2745e4df0fee56c6", "score": "0.6426142", "text": "func init() {\n\tRootCmd.AddCommand(ScrapeCmd)\n\tRootCmd.Flags().BoolVar(&rootVersion, \"version\", false, \"print this version\")\n\n\tScrapeCmd.Flags().BoolVar(&scrapeExecFlag, \"exec\", false, \"always required to perform scraping\")\n\tScrapeCmd.Flags().StringVar(&scrapeProjectID, \"project\", \"\", \"gcp project id\")\n\tScrapeCmd.Flags().StringVar(&scrapeRegionName, \"region\", \"\", \"region name\")\n\tScrapeCmd.Flags().StringVar(&scrapeGKEClusterName, \"cluster-name\", \"\", \"target GKE cluster name\")\n}", "title": "" }, { "docid": "4673d1d3c70821ce0d21cc1773c6ac8f", "score": "0.641353", "text": "func init() {\n\tparseFlags()\n\t// handle help\n\tif help == true {\n\t\tprintHelp()\n\t\tos.Exit(0)\n\t}\n\treturn\n}", "title": "" }, { "docid": "ce246ee49067472f0c44ea82ab9f0413", "score": "0.64089876", "text": "func init() {\n\n\tflag.Parse()\n\n}", "title": "" }, { "docid": "2db9627e4afca458fcc170741fd134a9", "score": "0.64012975", "text": "func initArgs() Args {\n\tds := make([]string, 0)\n\tds = append(ds, \"servers\")\n\tds = append(ds, \"staff\")\n\n\tusers := make([]map[string]string, 0)\n\tu1 := make(map[string]string, 0)\n\tu1[\"username\"] = \"daniel\"\n\tu1[\"password\"] = \"4557832+#^\"\n\n\tu2 := make(map[string]string, 0)\n\tu2[\"username\"] = \"kulkarni\"\n\tu2[\"password\"] = \"5*7832!@$\"\n\n\tusers = append(users, u1)\n\tusers = append(users, u2)\n\ta := Args{}\n\ta.Users = users\n\ta.Databases = ds\n\ta.Image = \"postgres:9.3\"\n\ta.Replicas = 3\n\ta.Version = 1\n\ta.DeploymentName = \"MyDeployment\"\n\n\treturn a\n}", "title": "" }, { "docid": "7ffc3275d4df1943c1f11c9d5c631a57", "score": "0.6395197", "text": "func init() {\n\tif len(os.Args[1:]) < 1 {\n\t\tfmt.Println(\"Please provide a BIF path or URL.\")\n\t\tfmt.Println(usage)\n\t\tos.Exit(1)\n\t}\n\n\t// TODO: Support URL paths.\n\t// isHTTP := strings.HasPrefix(os.Args[len(os.Args)-1], \"http\")\n}", "title": "" }, { "docid": "ae965e791969ae751276e25bc4a6635a", "score": "0.6388928", "text": "func newArguments(args cli.Args) (*arguments, error) {\n\tpath := args.First()\n\tif path == \"\" {\n\t\treturn nil, fmt.Errorf(\"no path was supplied\")\n\t}\n\treturn &arguments{\n\t\tPath: path,\n\t}, nil\n}", "title": "" }, { "docid": "3e0ac566912c5ae72a9b380ba7d562c8", "score": "0.63800454", "text": "func init() {\n\tflag.StringVar(&filename, \"file\", \"\", \"Filename to get last lines of text from.\")\n\tflag.IntVar(&numLines, \"n\", numLines, \"Number of lines to get from end of file.\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "ff493199ab19cbee08b0e62a6ddacd3d", "score": "0.6356526", "text": "func init() {\n\tflag.BoolVar(&add, \"a\", false, \"Use add mode\")\n\tflag.BoolVar(&del, \"d\", false, \"Use delete mode\")\n\tflag.BoolVar(&help, \"h\", false, \"Display flag options and usage\")\n\tflag.BoolVar(&list, \"l\", false, \"List all possible restaurants\")\n\tflag.BoolVar(&pick, \"p\", false, \"Pick a random restaurant\")\n\tflag.StringVar(&cat, \"c\", \"\", \"Specify the `name` of the category to add, delete, pick from, or list\")\n\tflag.StringVar(&rest, \"r\", \"\", \"Specify the `name` of the restaurant to add, or delete\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "035a67b832c19bf80be86c5eca54212e", "score": "0.63500506", "text": "func init() {\n\tflag.StringVar(&outputDir, outputDirFlag, \"\", \"`Output directory` for the generated website\")\n\tflag.StringVar(&projectDir, projectDirFlag, \"\", \"`Project path` containing sourcefiles used to generate website\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "010e017cd90e82ee8eaa8bb9fe39c97f", "score": "0.6349659", "text": "func init() {\n\tcmd.Root.AddCommand(seed)\n\tseed.PersistentFlags().StringVarP(&filePath, \"file\", \"f\", \"spnpgn.csv\", \"Path to seeding file\")\n\tseed.PersistentFlags().StringVarP(&seedtype, \"type\", \"t\", \"spnpgn\", \"Seeding Type (spnpgn or filter)\")\n}", "title": "" }, { "docid": "ebb1177be1eae533543ec5691290e209", "score": "0.63371116", "text": "func Init() {\n\t// Set parameters for database port and hostname\n\tflag.IntVar(&ARG_DB_PORT, \"port\", 3000, \"Database server port number.\")\n\tflag.StringVar(&ARG_DB_HOST, \"host\", \"localhost\", \"Database server hostname.\")\n\n\t// Set parameters for the database namespace and set names\n\tflag.StringVar(&ARG_DB_NAMESPACE, \"ns\", \"test\", \"Namespace to access within the database.\")\n\tflag.StringVar(&ARG_DB_SETS, \"sets\", \"\", \"Sets to wipe clean in the database. Separate multiple sets by colon.\")\n\n\t// Additional parameter for verbose program output\n\tflag.BoolVar(&ARG_VERBOSE, \"v\", false, \"Make program output verbose.\")\n\n\t// Parse the arguments\n\tflag.Parse()\n}", "title": "" }, { "docid": "11aa83662f0597e4db12d014bfae4fe3", "score": "0.6332621", "text": "func init() {\n\tflag.StringVar(&url, \"url\", \"localhost\", \"URL to listen from\")\n\tflag.IntVar(&port, \"port\", 5000, \"port to run on\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "60cba01dd6b4d61e6aef084b7a71b515", "score": "0.6330303", "text": "func init() {\n\t// Commands\n\trootCmd.AddCommand(setCmd)\n\trootCmd.AddCommand(getCmd)\n\trootCmd.AddCommand(scanCmd)\n\n\t// Flags\n\trootCmd.PersistentFlags().StringP(\"region\", \"r\", \"\", \"aws region/all\")\n\trootCmd.PersistentFlags().StringP(\"out\", \"o\", \"text\", \"Output text/json\")\n\trootCmd.PersistentFlags().Bool(\"slack\", false, \"send custom webhook slack message for monitor\")\n\t// rootCmd.PersistentFlags().StringP(\"type\", \"t\", \"instance\", \"instance/cluster\")\n}", "title": "" }, { "docid": "d15550114803bea97d5c3c47f28718be", "score": "0.6330278", "text": "func init() {\n\n\t// Initialize configuration\n\trootCmd.PersistentFlags().StringVarP(&configFile, \"config\", \"c\", \"\", \"Config file\")\n\n\trootCmd.PersistentFlags().StringVarP(&vendoPunktoHost, \"host\", \"H\", \"http://localhost\",\n\t\t\"The VendoPunkto host URL, without port, by default http://localhost\")\n\n\trootCmd.PersistentFlags().UintVar(&vendoPunktoPublicPort, \"public-port\", 8080,\n\t\t\"The VendoPunkto public port, by default 8080\")\n\n\trootCmd.PersistentFlags().UintVar(&vendoPunktoInternalPort, \"internal-port\", 9080,\n\t\t\"The VendoPunkto internal port, by default 9080\")\n}", "title": "" }, { "docid": "227b6ac4395d2282db28781962c186c3", "score": "0.6320374", "text": "func init() {\n\tuseCmd.Flags().StringVarP(&namespaceName, \"namespace\", \"n\", \"\", \"set a namespace to use\")\n}", "title": "" }, { "docid": "78ed2f975506a86747d2f85c9f8e1457", "score": "0.63191986", "text": "func initArgparser() {\n\targparser = flags.NewParser(&opts, flags.Default)\n\t_, err := argparser.Parse()\n\n\t// check if there is an parse error\n\tif err != nil {\n\t\tif flagsErr, ok := err.(*flags.Error); ok && flagsErr.Type == flags.ErrHelp {\n\t\t\tos.Exit(0)\n\t\t} else {\n\t\t\tfmt.Println()\n\t\t\targparser.WriteHelp(os.Stdout)\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\t// verbose level\n\tif opts.Logger.Verbose {\n\t\tlog.SetLevel(log.DebugLevel)\n\t}\n\n\t// debug level\n\tif opts.Logger.Debug {\n\t\tlog.SetReportCaller(true)\n\t\tlog.SetLevel(log.TraceLevel)\n\t}\n\n\t// json log format\n\tif opts.Logger.LogJson {\n\t\tlog.SetFormatter(&log.JSONFormatter{})\n\t}\n}", "title": "" }, { "docid": "fe98ee295b8011be6d9389297ec326f2", "score": "0.6297701", "text": "func init() {\n\tRootCmd.AddCommand(registerCmd)\n\n\t// Transaction Parameters\n\tregisterCmd.Flags().StringVar(&regArguments.identity, \"identity\", \"\", \"User's Identity\")\n\tregisterCmd.Flags().StringVar(&regArguments.chain, \"chain\", \"OneLedger\", \"Specify the chain\")\n\tregisterCmd.Flags().StringVar(&regArguments.pubkey, \"pubkey\", \"\", \"Specify a public key\")\n\tregisterCmd.Flags().StringVar(&regArguments.privkey, \"privkey\", \"\", \"Specify a private key\")\n}", "title": "" }, { "docid": "0801dfa55fdd8605bf15c8c9ba948325", "score": "0.6281918", "text": "func init() {\n\tRootCmd.AddCommand(accountCmd)\n\n\t// Transaction Parameters\n\taccountCmd.Flags().StringVar(&listargs.identity, \"identity\", \"\", \"user account name\")\n}", "title": "" }, { "docid": "8bdf0a3215c23c898a1ae302d9cc7049", "score": "0.62815183", "text": "func init() {\n\tstatsCmd.Flags().StringSliceP(\"files\", \"f\", []string{}, \"collection of torrent files\")\n\trootCmd.AddCommand(statsCmd)\n}", "title": "" }, { "docid": "1a60bbc929988e71d73a8a1b8a5c3199", "score": "0.62704545", "text": "func init() {\n port = flag.Int(\"p\", 1234, \"port\")\n logMode = flag.Bool(\"l\", true, \"log on/off\")\n\n flag.Parse()\n\n baseUrl = fmt.Sprintf(\"http://0.0.0.0:%d\", *port)\n repo = url.CreateMemoryRepo()\n}", "title": "" }, { "docid": "49d69c519ed59cf2f36250b3658a05f6", "score": "0.627029", "text": "func initArgparser() {\n\targparser = flags.NewParser(&opts, flags.Default)\n\t_, err := argparser.Parse()\n\n\t// check if there is an parse error\n\tif err != nil {\n\t\tif flagsErr, ok := err.(*flags.Error); ok && flagsErr.Type == flags.ErrHelp {\n\t\t\tos.Exit(0)\n\t\t} else {\n\t\t\tfmt.Println()\n\t\t\targparser.WriteHelp(os.Stdout)\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\t// verbose level\n\tif opts.Logger.Verbose {\n\t\tlog.SetLevel(log.DebugLevel)\n\t}\n\n\t// debug level\n\tif opts.Logger.Debug {\n\t\tlog.SetReportCaller(true)\n\t\tlog.SetLevel(log.TraceLevel)\n\t\tlog.SetFormatter(&log.TextFormatter{\n\t\t\tCallerPrettyfier: func(f *runtime.Frame) (string, string) {\n\t\t\t\ts := strings.Split(f.Function, \".\")\n\t\t\t\tfuncName := s[len(s)-1]\n\t\t\t\treturn funcName, fmt.Sprintf(\"%s:%d\", path.Base(f.File), f.Line)\n\t\t\t},\n\t\t})\n\t}\n\n\t// json log format\n\tif opts.Logger.LogJson {\n\t\tlog.SetReportCaller(true)\n\t\tlog.SetFormatter(&log.JSONFormatter{\n\t\t\tDisableTimestamp: true,\n\t\t\tCallerPrettyfier: func(f *runtime.Frame) (string, string) {\n\t\t\t\ts := strings.Split(f.Function, \".\")\n\t\t\t\tfuncName := s[len(s)-1]\n\t\t\t\treturn funcName, fmt.Sprintf(\"%s:%d\", path.Base(f.File), f.Line)\n\t\t\t},\n\t\t})\n\t}\n\n\tif opts.Portscan.Enabled {\n\t\t// parse --portscan-range\n\t\terr := argparserParsePortrange()\n\t\tif err != nil {\n\t\t\tfmt.Fprintf(os.Stderr, \"%v%v\\n\", \"[ERROR] \", err.Error())\n\t\t\tfmt.Println()\n\t\t\targparser.WriteHelp(os.Stdout)\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\tif opts.Cache.Path != \"\" {\n\t\tcacheDirectory := filepath.Dir(opts.Cache.Path)\n\t\tif _, err := os.Stat(cacheDirectory); os.IsNotExist(err) {\n\t\t\terr := os.Mkdir(cacheDirectory, 0755)\n\t\t\tif err != nil {\n\t\t\t\tlog.Panic(err)\n\t\t\t}\n\t\t}\n\t}\n\n\t// deprecated option\n\tif len(opts.Azure.ResourceGroupTags) > 0 {\n\t\topts.Azure.ResourceTags = opts.Azure.ResourceGroupTags\n\t}\n\n\t// scrape time\n\tif opts.Scrape.TimeGeneral == nil {\n\t\topts.Scrape.TimeGeneral = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeResource == nil {\n\t\topts.Scrape.TimeResource = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeQuota == nil {\n\t\topts.Scrape.TimeQuota = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeCompute == nil {\n\t\topts.Scrape.TimeCompute = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeNetwork == nil {\n\t\topts.Scrape.TimeNetwork = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeStorage == nil {\n\t\topts.Scrape.TimeStorage = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeIam == nil {\n\t\topts.Scrape.TimeIam = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeContainerRegistry == nil {\n\t\topts.Scrape.TimeContainerRegistry = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeContainerInstance == nil {\n\t\topts.Scrape.TimeContainerInstance = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeDatabase == nil {\n\t\topts.Scrape.TimeDatabase = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeEventhub == nil {\n\t\topts.Scrape.TimeEventhub = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeSecurity == nil {\n\t\topts.Scrape.TimeSecurity = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeResourceHealth == nil {\n\t\topts.Scrape.TimeResourceHealth = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeGraph == nil {\n\t\topts.Scrape.TimeGraph = &opts.Scrape.Time\n\t}\n\n\tazureResourceGroupTags = NewAzureTagFilter(AZURE_RESOURCE_TAG_PREFIX, opts.Azure.ResourceGroupTags)\n\tazureResourceTags = NewAzureTagFilter(AZURE_RESOURCE_TAG_PREFIX, opts.Azure.ResourceTags)\n\n\t// check deprecated env vars\n\tif os.Getenv(\"SCRAPE_TIME_COMPUTING\") != \"\" {\n\t\tlog.Panic(\"env var SCRAPE_TIME_COMPUTING is now SCRAPE_TIME_COMPUTE\")\n\t}\n}", "title": "" }, { "docid": "56ab324f5938aeaf9a41416c49e7c190", "score": "0.62637883", "text": "func init() {\n\t//contextType = reflect.TypeOf(Context{})\n\t//find the location of the exe file\n\t/*wd, _ := os.Getwd()\n\targ0 := path.Clean(os.Args[0])\n\tvar exeFile string\n\tif strings.HasPrefix(arg0, \"/\") {\n\t\texeFile = arg0\n\t} else {\n\t\t//TODO for robustness, search each directory in $PATH\n\t\texeFile = path.Join(wd, arg0)\n\t}\n\t_, _ := path.Split(exeFile)*/\n\treturn\n}", "title": "" }, { "docid": "7da8339d255ef1146c4c47ac4efc1b81", "score": "0.6241436", "text": "func init() {\n\tRootCmd.AddCommand(CrawlerCmd)\n\tCrawlerCmd.AddCommand(CrawlerSaveCmd, CrawlerListCmd, CrawlerRemoveCmd)\n\tCrawlerSaveCmd.Flags().String(FlagSource, \"MeloBit\", \"\")\n\tCrawlerSaveCmd.Flags().String(FlagName, \"\", \"\")\n\tCrawlerSaveCmd.Flags().String(FlagUrl, \"http://ws.blipapi.xyz/crowler/melobit/\", \"\")\n\tCrawlerRemoveCmd.Flags().String(FlagCrawlerID, \"\", \"\")\n}", "title": "" }, { "docid": "8ceaa86dc49a2a4dfaae375517a5cdd7", "score": "0.6232027", "text": "func init() {\n\tflag.StringVar(&serverAddress, \"address\", \"\", \"our address to use\")\n\tflag.StringVar(&simul, \"simul\", \"\", \"start simulating that protocol\")\n\tflag.StringVar(&monitorAddress, \"monitor\", \"\", \"remote monitor\")\n}", "title": "" }, { "docid": "468c51f23205061a632687132d96b56a", "score": "0.62314105", "text": "func init(){\n\tflag.StringVar(&configPath, \"config\", \"./Config.JSON\", \"Path to Config.JSON settings file\")\n\tflag.StringVar(&profanePath, \"profane\", \"./Profane.JSON\", \"Path to BadWords.JSON profane file\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "656f29805b52078d90499ed750801a7b", "score": "0.6229912", "text": "func (o *opts) setArgs() {\n\tif o.Parse(cleanArgs((os.Args[1:]))) != nil {\n\t\texitCmd(0)\n\t}\n\n\tif *o.apiKey != \"\" {\n\t\tcftoken = *o.apiKey\n\t}\n\n\tif *o.dbug {\n\t\tfmt.Println(\"screenLog()\")\n\t}\n\n\tif *o.help {\n\t\to.PrintDefaults()\n\t\texitCmd(0)\n\t}\n\n\tif *o.dryrun {\n\t\tfmt.Println(\"dry run only, no actions will be executed!\")\n\t\texitCmd(0)\n\t}\n\n\tif *o.verbose {\n\t\tfmt.Println(\"screenLog()\")\n\t}\n\n\tif *o.showVer {\n\t\tfmt.Printf(\n\t\t\t\" Build Information:\\n\"+\n\t\t\t\t\" Version:\\t\\t\\t%s\\n\"+\n\t\t\t\t\" Date:\\t\\t\\t%s\\n\"+\n\t\t\t\t\" CPU:\\t\\t\\t\\t%v\\n\"+\n\t\t\t\t\" OS:\\t\\t\\t\\t%v\\n\"+\n\t\t\t\t\" Git hash:\\t\\t\\t%v\\n\\n\"+\n\t\t\t\t\" This software comes with ABSOLUTELY NO WARRANTY.\\n\"+\n\t\t\t\t\" %s is free software, and you are\\n\"+\n\t\t\t\t\" welcome to redistribute it under the terms of\\n\"+\n\t\t\t\t\" the Simplified BSD License.\\n\",\n\t\t\tversion,\n\t\t\tbuild,\n\t\t\tarchitecture,\n\t\t\thostOS,\n\t\t\tgithash,\n\t\t\tprog,\n\t\t)\n\t\texitCmd(0)\n\t}\n}", "title": "" }, { "docid": "880856aded95a630bfce6a318865a893", "score": "0.62287927", "text": "func (cmd *LogCommand) Init(args []string) error {\n\tcmd.fs.Usage = cmd.Usage\n\tif err := cmd.fs.Parse(args); err != nil {\n\t\treturn err\n\t}\n\n\tif cmd.fs.NArg() < 1 {\n\t\tcmd.revision = \"HEAD\"\n\t} else {\n\t\tcmd.revision = cmd.fs.Arg(0)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a918db227eda70436ac21bbcf6692cff", "score": "0.6224665", "text": "func init() {\n\tflag.StringVar(&csvFile, \"f\", \"problems.csv\", \"name of csv file for quiz problems\")\n\tflag.IntVar(&timer, \"t\", 30, \"duration of quiz timer\")\n\tflag.BoolVar(&shuffle, \"s\", true, \"t/f for shuffling the questions\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "2d4c504f0794d60b95ec244817f3c61b", "score": "0.62182295", "text": "func init() {\n\t// Load up our `environment variables` from our operating system.\n\tsrAddress := os.Getenv(\"POLLER_SERVER_SERIAL_READER_SERVER_ADDRESS\")\n\tsrPort := os.Getenv(\"POLLER_SERVER_SERIAL_READER_SERVER_PORT\")\n\ttsAddress := os.Getenv(\"POLLER_SERVER_TSTORAGE_SERVER_ADDRESS\")\n\ttsPort := os.Getenv(\"POLLER_SERVER_TSTORAGE_SERVER_PORT\")\n\n\t// Make our environment variable globally accessible throughout all the\n\t// sub-commands in this project.\n\trootCmd.PersistentFlags().StringVar(&serialReaderAddress, \"srAddress\", srAddress, \"The address of the serial reader server this application will connect to.\")\n\trootCmd.PersistentFlags().StringVar(&serialReaderPort, \"srPort\", srPort, \"The port of the serial reader server this application will connect to.\")\n\trootCmd.PersistentFlags().StringVar(&tstorageAddress, \"tsAddress\", tsAddress, \"The address of the tstorage server this application will connect to.\")\n\trootCmd.PersistentFlags().StringVar(&tstoragePort, \"tsPort\", tsPort, \"The port of the tstorage server this application will connect to.\")\n}", "title": "" }, { "docid": "90a85c6246b95b0e15ea34de518c95a5", "score": "0.6212711", "text": "func init() {\n\tflag.StringVar(&gitDir, \"dir\", \".\", \"a git directory\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "be6beaa1c451510924addbf0724b0749", "score": "0.6191772", "text": "func init() {\n\trootCmd.PersistentFlags().StringP(\"listen-addr\", \"a\", \"127.0.0.1:8080\", \"Listen address\")\n\trootCmd.PersistentFlags().StringP(\"backend-url\", \"b\", \"http://127.0.0.1:8081\", \"The backend URL to proxy requests to. Must be in URL format.\")\n\tviper.BindPFlag(\"listen-addr\", rootCmd.PersistentFlags().Lookup(\"listen-addr\"))\n\tviper.BindPFlag(\"backend-url\", rootCmd.PersistentFlags().Lookup(\"backend-url\"))\n\tviper.SetEnvKeyReplacer(strings.NewReplacer(\"-\", \"_\"))\n\tviper.AutomaticEnv()\n}", "title": "" }, { "docid": "b6583007922e88e9d8683719a5b734b8", "score": "0.6190758", "text": "func init() {\n\thome, err := utils.GetHomeDir()\n\tif err != nil {\n\t\tlog.Fatalln(err.Error())\n\t}\n\tflag.StringVar(&target, \"t\", \"\", \"Target bug bounty program.\")\n\tflag.StringVar(&path, \"p\", filepath.FromSlash(home+\"/bug_bounty_hunting/\"), \"Path to folder for bug bounty program work.\")\n}", "title": "" }, { "docid": "957259a69913b718f5dae3893a36ee1a", "score": "0.61880606", "text": "func initFlags() {\n\tflag.Usage = func() {\n\t\tfmt.Fprintln(os.Stderr, \"---------------------------------------------------------\")\n\t\tfmt.Fprintln(os.Stderr, \"Usage: $ ./webpluck [-f filename.yml]\")\n\t\tfmt.Fprintln(os.Stderr, \"Example: $ ./webpluck -f ./extract_list.yml\")\n\t\tfmt.Fprintln(os.Stderr, \"---------------------------------------------------------\\nFlags:\")\n\t\tflag.PrintDefaults()\n\t}\n\n\tfilePtr = flag.String(\"f\", \"./targets.yml\",\n\t\t\"`File name (yml)` with the list of targets to pluck/extract\")\n\toutputTextPtr = flag.Bool(\"t\", false,\n\t\t\"Outputs the results in `text format` instead of JSON (applicable only in non server mode)\")\n\tserverModePtr = flag.Int(\"p\", 0,\n\t\t\"`Port number` to serve webpluck as in HTTP API\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "4dcaba238adc0e12c658ba05ff3c7513", "score": "0.61709565", "text": "func init() {\n\terr := godotenv.Load()\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tflag.StringVar(&message, \"message\", \"\", \"Message to be added to the blockchain\")\n\tflag.StringVar(&message, \"m\", \"\", \"(short) Message to be added to the blockchain\")\n\n\tflag.Parse()\n}", "title": "" }, { "docid": "d4e39a576e034ac7e1caefb68bbe907c", "score": "0.6156441", "text": "func init() {\t\n\n\t// Initialize default config directory\n\t_, dir, _, _ := runtime.Caller(0)\n\tdefaultConfigDir = filepath.Join(path.Dir(dir), \"config\")\n\n\t// Read command line\n\tparseSwitches()\n\n\t// Create symbolic links for images\n\tlinkAssets()\n\n\t// read in configuration files\n\treadConfigs(\"beacon\", func (file string) {beacon.AddBeaconFromConfig(file)})\n\treadConfigs(\"idp\", func (file string) {idp.AddIDPFromConfig(file)})\n}", "title": "" }, { "docid": "2ad5b59c2071c32a5ca8c0fdff349148", "score": "0.6153587", "text": "func InitArgs(args ...string) func(*LinuxFactory) error {\n\treturn func(l *LinuxFactory) (err error) {\n\t\tif len(args) > 0 {\n\t\t\t// Resolve relative paths to ensure that its available\n\t\t\t// after directory changes.\n\t\t\tif args[0], err = filepath.Abs(args[0]); err != nil {\n\t\t\t\t// The only error returned from filepath.Abs is\n\t\t\t\t// the one from os.Getwd, i.e. a system error.\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tl.InitArgs = args\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "ff117080d692b9f91e197a9add5f712c", "score": "0.61533344", "text": "func init() {\n\t// Unset localhost defaults if certificate file can not be found.\n\t_, err := os.Stat(opts.RPCCertificateFile)\n\tif err != nil {\n\t\topts.RPCConnect = \"\"\n\t\topts.RPCCertificateFile = \"\"\n\t}\n\n\t_, err = flags.Parse(&opts)\n\tif err != nil {\n\t\tos.Exit(1)\n\t}\n\n\tvar activeNet = chaincfg.MainNetParams()\n\tif opts.TestNet {\n\t\tactiveNet = chaincfg.TestNet3Params()\n\t}\n\n\tif opts.RPCConnect == \"\" {\n\t\tfatalf(\"RPC hostname[:port] is required\")\n\t}\n\trpcConnect, err := normalizeAddress(opts.RPCConnect, walletPort(activeNet))\n\tif err != nil {\n\t\tfatalf(\"Invalid RPC network address `%v`: %v\", opts.RPCConnect, err)\n\t}\n\topts.RPCConnect = rpcConnect\n\n\tif opts.RPCUsername == \"\" {\n\t\tfatalf(\"RPC username is required\")\n\t}\n\n\t_, err = os.Stat(opts.RPCCertificateFile)\n\tif err != nil {\n\t\tfatalf(\"RPC certificate file `%s` not found\", opts.RPCCertificateFile)\n\t}\n\n\tif opts.CFiltersFile == \"\" {\n\t\tfatalf(\"CFilters file is required\")\n\t}\n}", "title": "" }, { "docid": "e3be4f3ab5ebfadd4975087addf2a730", "score": "0.6143692", "text": "func init() {\n\tflag.StringVar(&seedNodes, \"seeds\", \"\", \"Seed nodes, comma separated host:port tuples (e.g. 12.34.56.78,23.34.45.56:8080\")\n\tflag.IntVar(&serverPort, \"port\", defaultPort, fmt.Sprintf(\"Port to bind on (defaults to %d)\", defaultPort))\n\tflag.BoolVar(&storeState, \"store-state\", true, \"Allow to store cluster state on this node (default=true)\")\n\tflag.StringVar(&hostname, \"hostname\", \"\", \"Hostname (defaults to auto-resolve)\")\n\tflag.StringVar(&ipAddr, \"ipaddr\", \"\", \"Ip address (defaults to auto-resoolve)\")\n\tflag.BoolVar(&debug, \"debug\", true, \"Debug logging\")\n\tflag.BoolVar(&ipv6, \"ipv6\", false, \"Enable ipv6\")\n\tflag.BoolVar(&noBindLocalhost, \"no-bind-localhost\", true, \"Do not bind localhost\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "13938cc86a0a3ffd9bf0c7db4f6bb8ac", "score": "0.6132133", "text": "func init() {\n\n\trootCmd.AddCommand(convertCMD)\n\n\tconvertCMD.Flags().StringVarP(&From, \"from\", \"f\", \"\", \"From is required. eg. KES\")\n\tconvertCMD.Flags().StringVarP(&To, \"to\", \"t\", \"\", \"To is required. eg. USD\")\n\tconvertCMD.Flags().StringVarP(&Amount, \"amount\", \"a\", \"\", \"Amount is required. eg. 100\")\n\n\tconvertCMD.MarkFlagRequired(\"from\")\n\tconvertCMD.MarkFlagRequired(\"to\")\n\tconvertCMD.MarkFlagRequired(\"amount\")\n}", "title": "" }, { "docid": "6357f0f3b629ed6142232a4f0daad919", "score": "0.6131874", "text": "func init() {\n\tflag.StringVar(&mqttBrokerURI, \"b\", \"tcp://edgehost:1883\", \"edge agent mqtt broker\")\n\tflag.StringVar(&filePath, \"f\", \"\", \"path to file for upload (required)\")\n\n\tflag.Parse()\n\n\tif filePath == \"\" {\n\t\tlog.Fatalln(\"Use '-f' command flag to specify file for upload!\")\n\t}\n\n\tif _, err := os.Stat(filePath); os.IsNotExist(err) {\n\t\tlog.Fatalf(\"File '%s' not found!\\n\", filePath)\n\t}\n}", "title": "" }, { "docid": "8fc1811f2959221c31eaa67ce158e0d7", "score": "0.61317843", "text": "func initArgparser() {\n\targparser = flags.NewParser(&opts, flags.Default)\n\t_, err := argparser.Parse()\n\n\t// check if there is an parse error\n\tif err != nil {\n\t\tvar flagsErr *flags.Error\n\t\tif ok := errors.As(err, &flagsErr); ok && flagsErr.Type == flags.ErrHelp {\n\t\t\tos.Exit(0)\n\t\t} else {\n\t\t\tfmt.Println()\n\t\t\targparser.WriteHelp(os.Stdout)\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\t// load accesstoken from file\n\tif opts.AzureDevops.AccessTokenFile != nil && len(*opts.AzureDevops.AccessTokenFile) > 0 {\n\t\tlogger.Infof(\"reading access token from file \\\"%s\\\"\", *opts.AzureDevops.AccessTokenFile)\n\t\t// load access token from file\n\t\tif val, err := os.ReadFile(*opts.AzureDevops.AccessTokenFile); err == nil {\n\t\t\topts.AzureDevops.AccessToken = strings.TrimSpace(string(val))\n\t\t} else {\n\t\t\tlogger.Fatalf(\"unable to read access token file \\\"%s\\\": %v\", *opts.AzureDevops.AccessTokenFile, err)\n\t\t}\n\t}\n\n\tif len(opts.AzureDevops.AccessToken) == 0 {\n\t\tlogger.Fatalf(\"no Azure DevOps access token specified\")\n\t}\n\n\t// ensure query paths and projects are splitted by '@'\n\tif opts.AzureDevops.QueriesWithProjects != nil {\n\t\tqueryError := false\n\t\tfor _, query := range opts.AzureDevops.QueriesWithProjects {\n\t\t\tif strings.Count(query, \"@\") != 1 {\n\t\t\t\tfmt.Println(\"Query path '\", query, \"' is malformed; should be '<query UUID>@<project UUID>'\")\n\t\t\t\tqueryError = true\n\t\t\t}\n\t\t}\n\t\tif queryError {\n\t\t\tos.Exit(1)\n\t\t}\n\t}\n\n\t// use default scrape time if null\n\tif opts.Scrape.TimeProjects == nil {\n\t\topts.Scrape.TimeProjects = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeRepository == nil {\n\t\topts.Scrape.TimeRepository = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimePullRequest == nil {\n\t\topts.Scrape.TimePullRequest = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeBuild == nil {\n\t\topts.Scrape.TimeBuild = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeRelease == nil {\n\t\topts.Scrape.TimeRelease = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeDeployment == nil {\n\t\topts.Scrape.TimeDeployment = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeStats == nil {\n\t\topts.Scrape.TimeStats = &opts.Scrape.Time\n\t}\n\n\tif opts.Scrape.TimeResourceUsage == nil {\n\t\topts.Scrape.TimeResourceUsage = &opts.Scrape.Time\n\t}\n\n\tif opts.Stats.SummaryMaxAge == nil {\n\t\topts.Stats.SummaryMaxAge = opts.Scrape.TimeStats\n\t}\n\n\tif opts.Scrape.TimeQuery == nil {\n\t\topts.Scrape.TimeQuery = &opts.Scrape.Time\n\t}\n\n\tif v := os.Getenv(\"AZURE_DEVOPS_FILTER_AGENTPOOL\"); v != \"\" {\n\t\tlogger.Fatal(\"deprecated env var AZURE_DEVOPS_FILTER_AGENTPOOL detected, please use AZURE_DEVOPS_AGENTPOOL\")\n\t}\n}", "title": "" }, { "docid": "4e3c906b24456b2c95630c09fbecdf00", "score": "0.61283445", "text": "func init() {\n\tserverAddress = clientCmd.Flags().StringP(\"serverAddress\", \"s\", fmt.Sprintf(\"%s:%s\", DefaultServerAddress, DefaultgRPCport), \"address of the server hosting the registry service\")\n\tserverRequest = clientCmd.Flags().StringP(\"request\", \"r\", \"\", \"server request (create|retrieve|update|delete)\")\n\tclientCmd.MarkFlagRequired(\"request\")\n\tclientCmd.MarkFlagRequired(\"refNum\")\n\trootCmd.AddCommand(clientCmd)\n}", "title": "" }, { "docid": "3cb20a3d40389883cf02d998e31f4bfe", "score": "0.6116295", "text": "func init() {\n\tcli.InitConfig(configName)\n}", "title": "" }, { "docid": "e967237377f5f3432e8f9b197243e648", "score": "0.6103597", "text": "func init() {\n\tverString = fmt.Sprintf(\"%d.%d.%d\", versionMajor, versionMinor, versionPatch)\n\tif versionMeta != \"\" {\n\t\tverString += \"-\" + versionMeta\n\t}\n\n\tcliApp = cli.NewApp(verString, \"glogchain CLI, your blockchain speaking\")\n\tcliApp.Commands = []cli.Command{\n\t\t{\n\t\t\tAction: \"initCommand\",\n\t\t\tName: \"init\",\n\t\t\tUsage: \"init genesis.json\",\n\t\t\tDescription: \"\",\n\t\t},\n\t}\n\tcliApp.HideVersion = true\n\tlogger.AddLogSystem(tmlog.NewStdLogSystem(os.Stdout, log.LstdFlags, tmlog.DebugLevel))\n\n}", "title": "" }, { "docid": "736e925de690e166c97909142084a84e", "score": "0.61023813", "text": "func init() {\n\trootCmd.AddCommand(deleteCmd)\n\n\tdeleteCmd.Flags().StringP(\n\t\t\"dayordate\", \"d\",\n\t\tutils.CurrentDate,\n\t\t\"Search records on a day of the week or date\",\n\t)\n\tdeleteCmd.Flags().StringP(\n\t\t\"month\", \"m\",\n\t\tutils.CurrentMonth,\n\t\t\"Search records in a month\",\n\t)\n\tdeleteCmd.Flags().StringP(\n\t\t\"year\", \"y\",\n\t\tutils.CurrentYear,\n\t\t\"Search records in a year\",\n\t)\n}", "title": "" }, { "docid": "dff11de49d6d7aaef658d3e9b6bcf3ae", "score": "0.60964674", "text": "func init() {\n\tflag.StringVar(&kubeconfig, \"kubeconfig\", \"\", \"path to kubeconfig file\")\n\t// XXX <GEB>: should we be using cli here?\n\tflag.StringVar(&redirectCIDRBlock, \"redirect-cidr-block\", \"\", \"overlay network CIDR block\")\n\tflag.Parse()\n}", "title": "" }, { "docid": "f82361ad6143c056d8738ab057e1a210", "score": "0.609212", "text": "func init() {\n\t// TODO (@mattdurham) we should look at removing this init. I think it can become\n\t// a function call now.\n\t// Register flags from all collector configs to a fake integration and then\n\t// parse an empty command line to force defaults to be populated.\n\tapp := kingpin.New(\"\", \"\")\n\n\t// Register all flags from collector\n\tcollectors := collector.CreateInitializers()\n\tcollector.RegisterCollectorsFlags(collectors, app)\n\n\t_, err := app.Parse([]string{})\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Map the configs with defaults applied to our default config.\n\tDefaultConfig.setDefaults(app)\n}", "title": "" }, { "docid": "caea8da86fae75f78298863ca8cfd83c", "score": "0.60874176", "text": "func commandLineConfig() *Config {\n\tconfig := NewConfig()\n\tflag.StringVar(&config.ApiKey, \"api_key\", config.ApiKey, \"Trello API key\")\n\tflag.StringVar(&config.ApiRoot, \"api_root\", config.ApiRoot, \"Trello API root URL\")\n\tflag.StringVar(&config.File, \"config\", config.File, \"Clitrello configuration file\")\n\tflag.StringVar(&config.Token, \"token\", config.Token, \"Trello user token\")\n\tflag.Parse()\n\treturn config\n}", "title": "" }, { "docid": "b8b7ddc097309b4bb55a970064be4e00", "score": "0.6083912", "text": "func init() {\n\tflag.BoolVar(&showVersion, \"version\", false, \"Show the app version\")\n\tflag.BoolVar(&showVersion, \"v\", false, \"Show the app version\")\n\n\tflag.BoolVar(&help, \"help\", false, \"this help\")\n\tflag.BoolVar(&help, \"h\", false, \"this help\")\n\n\t// Interoperability args\n\tflag.StringVar(&gen, \"css-dir\", \"\", \"Compass Build Directory\")\n\tflag.StringVar(&dir, \"images-dir\", \"\", \"Compass Image Directory\")\n\tflag.StringVar(&includes, \"sass-dir\", \"\", \"Compass Sass Directory\")\n\tflag.StringVar(&jsDir, \"javascripts-dir\", \"\", \"Compass JS Directory\")\n\tflag.BoolVar(&timeB, \"time\", false, \"Retrieve timing information\")\n\n\tflag.StringVar(&buildDir, \"b\", \"\", \"Build Directory\")\n\tflag.StringVar(&gen, \"gen\", \".\", \"Generated images directory\")\n\n\tflag.StringVar(&includes, \"proj\", \"\", \"Project directory\")\n\tflag.StringVar(&includes, \"p\", \"\", \"Project directory\")\n\tflag.StringVar(&dir, \"dir\", \"\", \"Image directory\")\n\tflag.StringVar(&dir, \"d\", \"\", \"Image directory\")\n\tflag.StringVar(&font, \"font\", \".\", \"Font Directory\")\n\n\tflag.StringVar(&style, \"style\", \"nested\", \"CSS nested style\")\n\tflag.StringVar(&style, \"s\", \"nested\", \"CSS nested style\")\n\tflag.BoolVar(&comments, \"comment\", true, \"Turn on source comments\")\n\tflag.BoolVar(&comments, \"c\", true, \"Turn on source comments\")\n\n\tflag.BoolVar(&ishttp, \"http\", false, \"Listen for http connections\")\n\tflag.StringVar(&httpPath, \"httppath\", \"\",\n\t\t\"Only for HTTP, overrides generated sprite paths to support http\")\n\tflag.BoolVar(&watch, \"watch\", false, \"File watcher that will rebuild css on file changes\")\n\tflag.BoolVar(&watch, \"w\", false, \"File watcher that will rebuild css on file changes\")\n\n\tflag.StringVar(&cpuprofile, \"cpuprofile\", \"\", \"write cpu profile to file\")\n}", "title": "" }, { "docid": "bb17fd04c91fc87c69987c1ff2ba2777", "score": "0.6068524", "text": "func init() {\n\trootCmd.PersistentFlags().StringVarP(&url,\n\t\t\"website\", \"w\", \"https://lawzava.com\", \"Website to scrape\")\n\trootCmd.PersistentFlags().BoolVar(&scraperParameters.Recursively,\n\t\t\"recursively\", true, \"Scrape website recursively\")\n\trootCmd.PersistentFlags().IntVarP(&scraperParameters.MaxDepth,\n\t\t\"depth\", \"d\", 3, \"Max depth to follow when scraping recursively\")\n\trootCmd.PersistentFlags().BoolVar(&scraperParameters.Async,\n\t\t\"async\", true, \"Scrape website pages asynchronously\")\n\trootCmd.PersistentFlags().BoolVar(&scraperParameters.Debug,\n\t\t\"debug\", false, \"Print debug logs\")\n\trootCmd.PersistentFlags().BoolVar(&scraperParameters.FollowExternalLinks,\n\t\t\"follow-external\", false, \"Follow external 3rd party links within website\")\n\trootCmd.PersistentFlags().BoolVar(&scraperParameters.EnableJavascript,\n\t\t\"js\", false, \"Enables EnableJavascript execution await\")\n\trootCmd.PersistentFlags().IntVar(&scraperParameters.Timeout,\n\t\t\"timeout\", 0, \"If > 0, specify a timeout (seconds) for js execution await\")\n\trootCmd.PersistentFlags().BoolVarP(&csv,\n\t\t\"output-csv\", \"c\", false, \"Output csv: <url>,<email>\")\n}", "title": "" }, { "docid": "8a700e74c8cbc697ca9b6eda4287c665", "score": "0.60685015", "text": "func init() {\n\n\t// Server type flag\n\tflag.StringVar(&serverType, \"server-type\", \"nginx\",\n\t\t\"Currently active server; e.g. 'nginx' \")\n\n\t// Daemon mode flag\n\tflag.BoolVar(&daemonMode, \"daemon-mode\", false,\n\t\t\"Whether or not to run this program as a background service.\")\n\n\t// Version mode flag\n\tflag.BoolVar(&printVersion, \"version\", false,\n\t\t\"Print the current version of this program and exit.\")\n}", "title": "" }, { "docid": "dd305efcce56debdf1d4ce1f9a40f365", "score": "0.6065993", "text": "func init() {\n\t// may change to listen eth number\n\tflag.StringVar(&bingdingIP, \"ip\", \"127.0.0.1\", \"listen ip\")\n\tflag.IntVar(&listenPort, \"p\", 6666, \"listen port\")\n\tflag.IntVar(&listenPort, \"port\", 6666, \"listen port\")\n\tflag.IntVar(&passPeriod, \"t\", 10, \"seconds for one period\")\n\tflag.IntVar(&passNumber, \"c\", 10, \"token quata to dispatch in one period\")\n\tflag.IntVar(&maxSeats, \"max\", 1000000, \"token quata to dispatch in one period\")\n\n\tflag.BoolVar(&helpMe, \"h\", false, \"help\")\n\tflag.BoolVar(&helpMe, \"help\", false, \"help\")\n}", "title": "" }, { "docid": "9d0b61b5010d8bcb9317f9051156c194", "score": "0.60608095", "text": "func init() {\n\tvar cmd = _CMDFoo\n\t// if you need config & logger, use support*\n\tsupportConfigAndLogger(cmd)\n\n\t// --hello world!\n\tcmd.PersistentFlags().String(\"hello\", \"world!\", \"for testing\")\n\n\t_CMDRoot.AddCommand(cmd)\n}", "title": "" }, { "docid": "0e2d0e1812639f19bccd0814d2f90a2a", "score": "0.6056578", "text": "func initArg() (string, string, error) {\r\n\tvar url, path string\r\n\tvar err error\r\n\r\n\tswitch len(os.Args) {\r\n\tcase 3: //输入完整参数\r\n\t\turl = os.Args[1]\r\n\t\tpath = os.Args[2]\r\n\t\terr = nil\r\n\tcase 2: //只输入URL\r\n\t\ts := strings.Split(os.Args[1], \"/\")\r\n\t\tif s[len(s)-1] != \"\" {\r\n\t\t\turl = os.Args[1]\r\n\t\t\tpath = s[len(s)-1]\r\n\t\t\terr = nil\r\n\t\t} else {\r\n\t\t\tfmt.Print(\"无法自动识别文件名,请手动输入:\")\r\n\t\t\tscanner := bufio.NewScanner(os.Stdin)\r\n\t\t\tif scanner.Scan() {\r\n\t\t\t\turl = os.Args[1]\r\n\t\t\t\tpath = scanner.Text()\r\n\t\t\t\terr = nil\r\n\t\t\t} else {\r\n\t\t\t\turl = \"\"\r\n\t\t\t\tpath = \"\"\r\n\t\t\t\terr = errors.New(\"读取输入时出错!\")\r\n\t\t\t}\r\n\t\t}\r\n\tcase 1: //运行时输入\r\n\t\tfmt.Println(\"未指定文件地址,请手动输入:\")\r\n\t\tscanner := bufio.NewScanner(os.Stdin)\r\n\t\tif scanner.Scan() {\r\n\t\t\turl = scanner.Text()\r\n\t\t} else {\r\n\t\t\turl = \"\"\r\n\t\t\tpath = \"\"\r\n\t\t\terr = errors.New(\"读取输入时出错!\")\r\n\t\t\tbreak\r\n\t\t}\r\n\t\ts := strings.Split(url, \"/\")\r\n\t\tif s[len(s)-1] != \"\" {\r\n\t\t\tpath = s[len(s)-1]\r\n\t\t\terr = nil\r\n\t\t} else {\r\n\t\t\tfmt.Print(\"无法自动识别文件名,请手动输入:\")\r\n\t\t\tscanner := bufio.NewScanner(os.Stdin)\r\n\t\t\tif scanner.Scan() {\r\n\t\t\t\tpath = scanner.Text()\r\n\t\t\t\terr = nil\r\n\t\t\t} else {\r\n\t\t\t\turl = \"\"\r\n\t\t\t\tpath = \"\"\r\n\t\t\t\terr = errors.New(\"读取输入时出错!\")\r\n\t\t\t}\r\n\t\t}\r\n\tdefault:\r\n\t\turl = \"\"\r\n\t\tpath = \"\"\r\n\t\terr = errors.New(\"参数错误!\")\r\n\t}\r\n\treturn url, path, err\r\n}", "title": "" }, { "docid": "ea6392a11d59dba97d87eb43f9cca0e9", "score": "0.6044188", "text": "func init() {\r\n\tserverPort := 3000\r\n\tproxyPort := 8080\r\n\tflag.IntVar(&serverPort, \"serverPort\", serverPort, \"Server Port\")\r\n\tflag.IntVar(&proxyPort, \"proxyPort\", proxyPort, \"Server Port\")\r\n\tflag.Parse()\r\n\tserverURL = fmt.Sprintf(\"%s:%d\", host, serverPort)\r\n\tproxyURL = fmt.Sprintf(\"%s:%d\", host, proxyPort)\r\n}", "title": "" }, { "docid": "7c1022f93640993d11e4f08f80db7337", "score": "0.60317165", "text": "func getArgs() (Args, error) {\n\tlistenHost := flag.String(\"host\", \"0.0.0.0\", \"Host to listen on.\")\n\tlistenPort := flag.Int(\"port\", 8080, \"Port to listen on.\")\n\tformat := flag.String(\"format\", \"rtsp\", \"Input format. Example: rtsp for RTSP.\")\n\tinput := flag.String(\"i\", \"\", \"Input URL valid for the given format. For RTSP you can provide a rtsp:// URL.\")\n\toutput := flag.String(\"o\", \"\", \"Output URL valid for the given format. For HLS you can provide a https://a.upload.youtube.com/...\")\n\toutputFormat := flag.String(\"f\", \"mp4\", \"Output format.\")\n\taudio := flag.Bool(\"a\", false, \"send audio\")\n\tverbose := flag.Bool(\"verbose\", false, \"Enable verbose logging output.\")\n\tfcgi := flag.Bool(\"fcgi\", false, \"Serve using FastCGI (true) or as a regular HTTP server.\")\n\n\tflag.Parse()\n\n\tif len(*listenHost) == 0 {\n\t\tflag.PrintDefaults()\n\t\treturn Args{}, fmt.Errorf(\"you must provide a host\")\n\t}\n\n\tif len(*format) == 0 {\n\t\tflag.PrintDefaults()\n\t\treturn Args{}, fmt.Errorf(\"you must provide an input format\")\n\t}\n\n\tif len(*input) == 0 {\n\t\tflag.PrintDefaults()\n\t\treturn Args{}, fmt.Errorf(\"you must provide an input URL\")\n\t}\n\n\treturn Args{\n\t\tListenHost: *listenHost,\n\t\tListenPort: *listenPort,\n\t\tInputFormat: *format,\n\t\tInputURL: *input,\n\t\tOutputURL: *output,\n\t\tOutputFormat: *outputFormat,\n\t\tAudio:\t\t *audio,\n\t\tVerbose: *verbose,\n\t\tFCGI: *fcgi,\n\t}, nil\n}", "title": "" }, { "docid": "a9f01c5bf886467fc57cc26a8d3590bb", "score": "0.600718", "text": "func init() {\n\tflag.StringVar(&pngPath, \"o\", \"random.png\", \"png output file\")\n\tflag.IntVar(&numObj, \"n\", 30, \"number of objects\")\n\tflag.BoolVar(&reseed, \"s\", false, \"initialize with random seed\")\n}", "title": "" }, { "docid": "3ffbe4b7eea7a5aef8604beecf1460c6", "score": "0.6000956", "text": "func init() {\n\trootCmd.AddCommand(pivotCmd)\n\tpflag.CommandLine.AddGoFlagSet(flag.CommandLine)\n}", "title": "" }, { "docid": "cea9e7d76d7cd1e934443825305d92da", "score": "0.59950495", "text": "func (args *args) Init(options []cliOptionValue) {\n\tfor i := 0; i < len(options); i++ {\n\t\toptions[i].value = flag.String(options[i].definition.name, options[i].definition.defaultValue, options[i].definition.description)\n\t}\n}", "title": "" }, { "docid": "c68769b8c2f330c4b140683f06c549db", "score": "0.597605", "text": "func main() {\n // os.Args provides access to raw command-line arguments.\n // Note that the first value in this slice is the path to\n // the program, and os.Args[1:] holds the arguments to\n // the program.\n argsWithProg := os.Args\n argsWithoutProg := os.Args[1:]\n\n // You can get individual args with normal indexing\n arg := os.Args[3]\n\n fmt.Println(argsWithProg)\n fmt.Println(argsWithoutProg)\n fmt.Println(arg)\n\n // To experiment with command-line arguments it's best to\n // build a binary with go build first\n // $ go build command-line-arguments.go\n // $ ./command-line-arguments a b c d\n}", "title": "" }, { "docid": "9e0f114c7f417ef0e82dff583b0c093d", "score": "0.597411", "text": "func init() {\n\tvar flagSet = rootCmd.PersistentFlags()\n\n\tcobra.OnInitialize(load)\n\n\tflagSet.String(\"config\", \"/etc/trackers/trackers.yaml\", \"Trackers configuration file path.\")\n\n\tif err := viper.BindPFlags(flagSet); err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "6f6a0ef1b172404a038fa95d6ad2cd5f", "score": "0.59735566", "text": "func init() {\n\tflag.StringVar(&config, \"conf\", \"\", \"config file.\")\n}", "title": "" }, { "docid": "e6f42b516fb1055da93056f151f5be26", "score": "0.596353", "text": "func getArguments() ConfigInfo {\n\tfs := flag.NewFlagSet(\"repl_data\", flag.ContinueOnError)\n\tdbnameArg := fs.String(\"dbname\", \"\", \"DB2 Database Name underlying LDAP.\")\n\thostnameArg := fs.String(\"hostname\", \"localhost\", \"Hostname of LDAP server (defaults to localhost).\")\n\tportArg := fs.Int(\"port\", 50000, \"Port# DB2 is listening on (defaults to 50000).\")\n\tschemaArg := fs.String(\"schema\", \"\", \"DB2 Table name schema (defaults to userid).\")\n\tuseridArg := fs.String(\"userid\", \"\", \"Userid to connect to DB2 (defaults to dbname).\")\n\tpasswordArg := fs.String(\"password\", \"\", \"Password to connect to DB2.\")\n\treplicaArg := fs.String(\"replica\", \"\", \"Optional replica to limit report to.\")\n\tloglevelArg := fs.String(\"loglevel\", \"CRITICAL\", \"Logging Level (defaults to CRITICAL).\")\n\toutputcsvArg := fs.Bool(\"outputcsv\", false, \"Text output or CSV format (defaults to False).\")\n\toutput_fileArg := fs.String(\"output_file\", \"\", \"Output CSV of differences (defaults to stdout).\")\n\thelpArg := fs.Bool(\"help\", false, \"Display the full help text\")\n\n\tif err := fs.Parse(os.Args[1:]); err != nil {\n\t\tos.Exit(1)\n\t}\n\n\tif *helpArg {\n\t\tdoHelp()\n\t}\n\n\tif *dbnameArg == \"\" || *passwordArg == \"\" {\n\t\trequiredArguments := \"\"\n\t\tif *dbnameArg == \"\" {\n\t\t\trequiredArguments += \" --dbname\"\n\t\t}\n\t\tif *passwordArg == \"\" {\n\t\t\trequiredArguments += \" --password\"\n\t\t}\n\t\tmessage := fmt.Sprintf(\"repl_data.go: error: the following arguments are required: %s\\n\", requiredArguments)\n\t\tdoUsage(message)\n\t}\n\n\tuserid := *useridArg\n\tif *useridArg == \"\" {\n\t\tuserid = *dbnameArg\n\t}\n\tschema := *schemaArg\n\tif schema == \"\" {\n\t\tschema = userid\n\t}\n\n\treplica := *replicaArg\n\t\n\tswitch strings.Title(*loglevelArg) {\n\tcase \"Trace\":\n\t\tlog.SetLevel(log.TraceLevel)\n\tcase \"Debug\":\n\t\tlog.SetLevel(log.DebugLevel)\n\tcase \"Info\":\n\t\tlog.SetLevel(log.InfoLevel)\n\tcase \"Warn\":\n\t\tlog.SetLevel(log.WarnLevel)\n\tcase \"Error\":\n\t\tlog.SetLevel(log.ErrorLevel)\n\tcase \"Fatal\":\n\t\tlog.SetLevel(log.FatalLevel)\n\tcase \"Panic\":\n\t\tlog.SetLevel(log.PanicLevel)\n\tdefault:\n\t\tlog.SetLevel(log.ErrorLevel)\n\t}\n\n\tlog.SetFormatter(&log.TextFormatter{\n\t\tDisableColors: true,\n\t\tFullTimestamp: true,\n\t})\n\n\tlog.SetReportCaller(true)\n\n\tconnectionString := fmt.Sprintf(\"HOSTNAME=%s;DATABASE=%s;PORT=%d;UID=%s;PWD=%s\", *hostnameArg, *dbnameArg, *portArg, userid, *passwordArg)\n\n\tdatabaseInfo := DatabaseInfo{\n\t\thostname: *hostnameArg,\n\t\tport: *portArg,\n\t\tuserid: userid,\n\t\tpassword: *passwordArg,\n\t\tdbname: *dbnameArg,\n\t\tschema: schema,\n\t\tconnectionString: connectionString,\n\t}\n\n\toutputInfo := OutputInfo{\n\t\tcsv: *outputcsvArg,\n\t\tfilename: *output_fileArg,\n\t}\n\n\tvar consumerWriter ConsumerWriter\n\tif *outputcsvArg {\n consumerWriter = &csvConsumerWriter{filename: *output_fileArg}\n } else {\n\t consumerWriter = &textConsumerWriter{filename: *output_fileArg}\n }\n \n\treturn ConfigInfo{\n\t\tdatabases: []DatabaseInfo{databaseInfo},\n replica: replica,\n\t\tlogLevel: *loglevelArg,\n\t\toutputInfo: outputInfo,\n consumerWriter: consumerWriter,\n\t}\n}", "title": "" }, { "docid": "623d4c5b7ad48b5c28248a8b4da771ef", "score": "0.5961217", "text": "func init() {\n\t//flag.Parse()\n}", "title": "" }, { "docid": "b7ce85b7e76ba1c495059a8f6f3c5020", "score": "0.59555966", "text": "func init() {\n\tlog.SetFlags(0)\n\tparseFlags()\n\tif help == true {\n\t\tprintHelp()\n\t\tos.Exit(0)\n\t}\n\n\t// turn on debuging and force quiet to off\n\tif verbose {\n\t\tdebug = true\n\t\tquiet = false\n\t}\n\n}", "title": "" }, { "docid": "554402b7a78685fe25a5b36d72302605", "score": "0.59463865", "text": "func init() {\n\tPromu.AddCommand(versionCmd)\n\n\tversionCmd.Flags().BoolVarP(&short, \"short\", \"s\", false, \"Print shorter version\")\n}", "title": "" }, { "docid": "dbfd3cb183f39583dd281d71e0cf7ba4", "score": "0.5942436", "text": "func init() {\n\tflag.StringVar(&storageFile, \"config\", \"examples/config.yaml\", \"Storage config YAML file\")\n\tflag.StringVar(&addr, \"addr\", \"0.0.0.0:50051\", \"Listening addr\")\n}", "title": "" } ]
e16f2f1f098974715b75f2f8ca614b15
Test is the proxy function for the method defined in the tars file, with the context
[ { "docid": "a1beca43a2fd69d4aa43645a032d11eb", "score": "0.52452004", "text": "func (_obj *UserInfoService) Test(testStr *string, _opt ...map[string]string) (ret int32, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = _os.Write_string((*testStr), 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\ttarsCtx := context.Background()\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"Test\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = _is.Read_int32(&ret, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _is.Read_string(&(*testStr), 1, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "title": "" } ]
[ { "docid": "91de39ce7114a1c4ebb74e109afa7ac4", "score": "0.6090719", "text": "func Test(t *testing.T) { TestingT(t)}", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "07f4e382ffea56ba01853b7e04be5a78", "score": "0.5909676", "text": "func Test(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "15f78c7db132cdf2dba16566edb0b5dd", "score": "0.56069374", "text": "func testAction(context *dtcontext.DTContext, resource string, msg interface{}) error {\n\tcalled = true\n\treturn errors.New(\"Called the dummy function for testing\")\n}", "title": "" }, { "docid": "64c7f9515638d38edcb74dd04c22131f", "score": "0.5519351", "text": "func TestTFXServing(t *testing.T) {\n}", "title": "" }, { "docid": "418bd2eef3897386cc95fa2c057a9e17", "score": "0.5482174", "text": "func runTest(test *testing.T, name string, testFunc func(*testing.T)) {\n\ttestFunc(test)\n}", "title": "" }, { "docid": "656de6ab2f4cc3ad6dd3cf5ecbdefd8f", "score": "0.54628867", "text": "func TestVersion(*testing.T) {}", "title": "" }, { "docid": "082c1e92ae90521f3d6ae606742c8cda", "score": "0.54178286", "text": "func TestNewEngine(t *testing.T) {\n\n}", "title": "" }, { "docid": "831958cc557e59d88120ed59d325401a", "score": "0.53895164", "text": "func TestClosure(t *testing.T) { runTest(t, \"closure.go\") }", "title": "" }, { "docid": "db5777032184eba6506ec6ea0bec41ee", "score": "0.5380001", "text": "func Test(t *testing.T) { chk.TestingT(t) }", "title": "" }, { "docid": "db5777032184eba6506ec6ea0bec41ee", "score": "0.5380001", "text": "func Test(t *testing.T) { chk.TestingT(t) }", "title": "" }, { "docid": "0f933a4cd86b29b3d3c808dcdc352029", "score": "0.53459173", "text": "func Test(t *testing.T) { gc.TestingT(t) }", "title": "" }, { "docid": "0f933a4cd86b29b3d3c808dcdc352029", "score": "0.53459173", "text": "func Test(t *testing.T) { gc.TestingT(t) }", "title": "" }, { "docid": "0cc0c140c10d5aad26c01d107f69bba1", "score": "0.5339408", "text": "func (_obj *UserInfoService) TestWithContext(tarsCtx context.Context, testStr *string, _opt ...map[string]string) (ret int32, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = _os.Write_string((*testStr), 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 0, \"Test\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\t_is := codec.NewReader(tools.Int8ToByte(_resp.SBuffer))\n\terr = _is.Read_int32(&ret, 0, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\terr = _is.Read_string(&(*testStr), 1, true)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "title": "" }, { "docid": "0832f0b75a1d45380cd1c4808680f460", "score": "0.5313401", "text": "func generateTestsGet(method ServiceMethod, objects map[string]RamlType) (code *jen.Statement) {\n\n\tmethodParams := jen.List(\n\t\tjen.Id(\"t\").Op(\"*\").Qual(\"testing\", \"T\"),\n\t)\n\treturnObject := objects[method.ReturnType]\n\n\tobjName := strcase.ToSnake(method.ReturnType)\n\tswitch objName {\n\tcase \"type\":\n\t\tobjName = \"rType\"\n\t}\n\n\tc := jen.Func().Id(\"TestGenerated\" + method.Name).Params(methodParams).BlockFunc(func(d *jen.Group) {\n\n\t\td.Id(\"responseData\").Op(\":=\").Add(jsonBlock(method.ExampleData))\n\t\td.List(jen.Id(\"client\"), jen.Id(\"server\")).Op(\":=\").Qual(pkgTestUtil, \"MockClient\").Call(\n\t\t\tjen.Id(\"t\"),\n\t\t\tjen.Id(\"responseData\"),\n\t\t\tjen.Nil(),\n\t\t\tjen.Nil(),\n\t\t)\n\n\t\td.Defer().Id(\"server\").Op(\".\").Id(\"Close\").Call()\n\n\t\td.List(jen.Id(objName), jen.Err()).Op(\":=\").Id(\"client\").Op(\".\").Id(method.Name).CallFunc(func(d *jen.Group) {\n\t\t\td.Qual(\"context\", \"TODO\").Call()\n\t\t\tfor range method.Parameters {\n\t\t\t\td.Lit(\"dummy-id\")\n\t\t\t}\n\n\t\t})\n\n\t\td.If(jen.Err().Op(\"!=\").Nil()).Block(\n\t\t\tjen.Id(\"t\").Op(\".\").Id(\"Fatal\").Call(jen.Err()),\n\t\t)\n\n\t\td.Add(generateAssertStatements(objName, method, returnObject))\n\n\t}).Line()\n\treturn c\n}", "title": "" }, { "docid": "d94426d64eac19912cd7ce2870ea4c3b", "score": "0.529264", "text": "func (f *funcInfo) emitTest( a, c int) {\n\tf.emitABC( luavm.OP_TEST, a, 0, c)\n}", "title": "" }, { "docid": "e7d825b188c3c68f3279b3191f614119", "score": "0.5291168", "text": "func TestMain(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "31baf5d4574c14a35e33979dc23baf65", "score": "0.5287196", "text": "func TestProvisioner(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "3d48e292b6cf8cb96aa55cb33681d6d7", "score": "0.5272325", "text": "func testAPI(router *gin.Engine, method string, urlToServe string, urlToHit string, function gin.HandlerFunc, body string) *httptest.ResponseRecorder {\n\trouter.Handle(method, urlToServe, function)\n\tres := httptest.NewRecorder()\n\treq, _ := http.NewRequest(method, urlToHit, bytes.NewBufferString(body))\n\trouter.ServeHTTP(res, req)\n\treturn res\n}", "title": "" }, { "docid": "f35ad8ad8830bf6dff2b83c1ce8f4a34", "score": "0.5270771", "text": "func Test(t *testing.T) { test.TestingT(t) }", "title": "" }, { "docid": "c683e635ffc3763051d721242e8c62b8", "score": "0.5269996", "text": "func TestProviderControlService_GetListInProgress(t *testing.T) {\n\n}", "title": "" }, { "docid": "3f75aac901fbc2a462a3a6ab93a068f7", "score": "0.5266022", "text": "func TestOther(t *testing.T) {\n}", "title": "" }, { "docid": "3ebd0ab8468a6c85b93706d18bcc19d7", "score": "0.5241945", "text": "func (m *Module) Test(version int) func(ctx context.Context, param *router.HandlerParam) (apiresult router.HandlerResult) {\n\treturn m.getTestingData\n}", "title": "" }, { "docid": "c48aaf71424fc90514c5aca930d8770a", "score": "0.5233099", "text": "func Test() {\n\ttest()\n}", "title": "" }, { "docid": "e0d0a4077afbd0cde9540af34289d9aa", "score": "0.5204965", "text": "func Test_Listen(t *testing.T) {\n\n}", "title": "" }, { "docid": "19b12c142020e6e137b74fa5701f8285", "score": "0.5200109", "text": "func TestGetStaff(t *testing.T) {\n\n // ...\n\n}", "title": "" }, { "docid": "a554a183d6ec2aa38e4b5e395f040949", "score": "0.51834273", "text": "func TestIntegration(t *testing.T) { TestingT(t) }", "title": "" }, { "docid": "e838754c752fd14b52365597a5ffe4a2", "score": "0.51506895", "text": "func test1() {\n\n\n}", "title": "" }, { "docid": "f5b284e72cea4c2f0c06206a60d5e864", "score": "0.5113604", "text": "func (_obj *UserInfoService) TestOneWayWithContext(tarsCtx context.Context, testStr *string, _opt ...map[string]string) (ret int32, err error) {\n\n\tvar length int32\n\tvar have bool\n\tvar ty byte\n\t_os := codec.NewBuffer()\n\terr = _os.Write_string((*testStr), 1)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tvar _status map[string]string\n\tvar _context map[string]string\n\tif len(_opt) == 1 {\n\t\t_context = _opt[0]\n\t} else if len(_opt) == 2 {\n\t\t_context = _opt[0]\n\t\t_status = _opt[1]\n\t}\n\t_resp := new(requestf.ResponsePacket)\n\n\terr = _obj.s.Tars_invoke(tarsCtx, 1, \"Test\", _os.ToBytes(), _status, _context, _resp)\n\tif err != nil {\n\t\treturn ret, err\n\t}\n\n\tif len(_opt) == 1 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t} else if len(_opt) == 2 {\n\t\tfor k := range _context {\n\t\t\tdelete(_context, k)\n\t\t}\n\t\tfor k, v := range _resp.Context {\n\t\t\t_context[k] = v\n\t\t}\n\t\tfor k := range _status {\n\t\t\tdelete(_status, k)\n\t\t}\n\t\tfor k, v := range _resp.Status {\n\t\t\t_status[k] = v\n\t\t}\n\n\t}\n\t_ = length\n\t_ = have\n\t_ = ty\n\treturn ret, nil\n}", "title": "" }, { "docid": "c7a20fe942ae1ce535bc5d3390fed337", "score": "0.5077905", "text": "func subTest(t testing.TB, name string, f func(t testing.TB)) {\n\tswitch t := t.(type) {\n\tcase *testing.T:\n\t\tt.Run(name, func(t *testing.T) { f(t) })\n\tcase *testing.B:\n\t\tt.Run(name, func(t *testing.B) { f(t) })\n\tcase interface {\n\t\tRun(string, func(testing.TB))\n\t}:\n\t\tt.Run(name, f)\n\tdefault:\n\t\tpanic(fmt.Sprintf(\"don't know how to call Run over %T\", t))\n\t}\n}", "title": "" }, { "docid": "f6a1d7645701db4bcb5ebbe039ff4480", "score": "0.50678897", "text": "func SetTest(i interface{}, vars map[string]string, r *http.Request) (*httptest.ResponseRecorder, error) {\n\tinstance := reflect.ValueOf(i)\n\tinstance = reflect.Indirect(instance)\n\tvar service reflect.Value\n\tindex := 0\n\tfor i, n := 0, instance.NumField(); i < n; i++ {\n\t\tfield := instance.Field(i)\n\t\tif field.Type().String() == \"rest.Service\" {\n\t\t\tservice, index = field, i\n\t\t}\n\t}\n\tif !service.IsValid() {\n\t\treturn nil, fmt.Errorf(\"%s doesn't contain rest.Service field.\", instance.Type().Name())\n\t}\n\t_, mime, charset, err := initService(service, instance.Type().Field(index).Tag)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tw := httptest.NewRecorder()\n\tw.Code = http.StatusOK\n\tif r == nil {\n\t\tr = new(http.Request)\n\t}\n\tctx, err := newContext(w, r, vars, mime, charset)\n\tctxField := service.FieldByName(\"context\")\n\tctxField.Set(reflect.ValueOf(ctx))\n\treturn w, nil\n}", "title": "" }, { "docid": "75e0fd01a1139b50043cef9b7c7e07f3", "score": "0.50666696", "text": "func TestDBEngineOpr(t *testing.T) {\n\n}", "title": "" }, { "docid": "74bddd5782df5883f376fd39b600d5a7", "score": "0.5066269", "text": "func testRun(args []string) error {\n\tmethod = \"\"\n\tservice = \"\"\n\n\tfs.VisitAll(func(f *flag.Flag) {\n\t\t_ = f.Value.Set(f.DefValue)\n\t})\n\n\ttestOutput.Reset()\n\tdefer func() {\n\t\tdefaultInput = os.Stdin\n\t}()\n\n\t*xenon = testURL\n\t*nonl = true\n\n\tselfLink = uuid.New()\n\tdata := map[string]interface{}{\n\t\t\"selfLink\": selfLink,\n\t}\n\n\t// expand input args (mainly for unique selfLink)\n\tvar xargs []string\n\n\tfor _, arg := range args {\n\t\tb, err := templateExecute(arg, data)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\txargs = append(xargs, b.String())\n\t}\n\n\t// expand input body templates\n\tif body, ok := defaultInput.(*bytes.Buffer); ok {\n\t\txbody, err := templateExecute(body.String(), data)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tdefaultInput = xbody\n\t}\n\n\treturn run(xargs)\n}", "title": "" }, { "docid": "c80f4e0fe49f3609e5037d92e26f95df", "score": "0.5041927", "text": "func (s *Service) Test(options interface{}) error {\n\treturn nil\n}", "title": "" }, { "docid": "ae0a7c8980c616c6457af2b39735f62b", "score": "0.5039426", "text": "func Testinit(t *testing.T) {\n\n}", "title": "" }, { "docid": "e478c1bd594f0bc0c04b54959e3bb652", "score": "0.50244343", "text": "func TestMain(t *testing.T) {\n}", "title": "" }, { "docid": "c0db330b477a1922a674fe9c6f50442e", "score": "0.50085545", "text": "func TestMemberInfo(t *testing.T) {\n\n}", "title": "" }, { "docid": "82ad2188542412ace92443d19337d392", "score": "0.49927437", "text": "func TestMethodWiths(t *testing.T) {\n\tMustGetAPIServer()\n\tsingletonAPISrv.runstate.running = true\n\tsingletonAPISrv.config.IsDryRun = fakeIsDryRun\n\tsingletonAPISrv.config.GetOverlay = fakeGetOverlay\n\tfsvc := mocks.NewFakeService()\n\n\treq := mocks.NewFakeMessage(\"test.TestType1\", \"TestType1\", true).(*mocks.FakeMessage)\n\tresp := mocks.NewFakeMessage(\"test.TestType2\", \"TestType2\", true).(*mocks.FakeMessage)\n\tf := mocks.NewFakeMethod(true).(*mocks.FakeMethod)\n\t// Add a few Pres and Posts and skip KV for testing\n\tm := NewMethod(fsvc, req, resp, \"testm\", \"TestMethodWiths\").WithVersion(\"v1\").WithPreCommitHook(f.PrecommitFunc).WithPreCommitHook(f.PrecommitFunc).WithPreCommitHook(f.PrecommitFunc)\n\tm = m.WithPostCommitHook(f.PostcommitfFunc).WithPostCommitHook(f.PostcommitfFunc).WithResponseWriter(f.RespWriterFunc).WithMakeURI(f.MakeURIFunc).WithResourceAllocHook(f.ResourceAllocFunc)\n\tm = m.WithOper(\"POST\").WithVersion(\"Vtest\")\n\n\treqmsg := TestType1{}\n\tmd := metadata.Pairs(apisrv.RequestParamVersion, singletonAPISrv.version,\n\t\tapisrv.RequestParamMethod, \"GET\")\n\tmhdlr := m.(*MethodHdlr)\n\tif mhdlr.version != \"Vtest\" || mhdlr.oper != \"POST\" {\n\t\tt.Errorf(\"Flags not set correction ver[%v] oper[%v]\", mhdlr.version, mhdlr.oper)\n\t}\n\tctx := metadata.NewIncomingContext(context.Background(), md)\n\trespmsg, _ := m.HandleInvocation(ctx, reqmsg)\n\n\tif r, ok := respmsg.(string); ok {\n\t\tif r != \"TestResponse\" {\n\t\t\tt.Errorf(\"Expecting a result of [TestResponse] got [%v]\", r)\n\t\t}\n\t} else {\n\t\tt.Errorf(\"Result not overridden\")\n\t}\n\n\tif f.Pres != 3 {\n\t\tt.Errorf(\"Expecting 3 precommit invocations found %v\", f.Pres)\n\t}\n\tif f.Posts != 2 {\n\t\tt.Errorf(\"Expecting 2 postcommit invocations found %v\", f.Posts)\n\t}\n\t// There should be no KV operations involved since the precommit skipped KV\n\tif req.Kvreads != 0 {\n\t\tt.Errorf(\"Expecting no KV reads but found %v\", req.Kvreads)\n\t}\n\n\tif f.MakeURIs != 1 {\n\t\tt.Errorf(\"expecting 1 MakeURI request got %d\", f.MakeURIs)\n\t}\n\tm.Disable()\n\tif mhdlr.enabled == true {\n\t\tt.Errorf(\"method should have been disabled\")\n\t}\n\tm.Enable()\n\tif mhdlr.enabled == false {\n\t\tt.Errorf(\"method should have been enabled\")\n\t}\n\n\tmsg1 := m.GetRequestType()\n\tif msg1 != req {\n\t\tt.Errorf(\"retrieved wrong request type\")\n\t}\n\tmsg1 = m.GetResponseType()\n\tif msg1 != resp {\n\t\tt.Errorf(\"retrieved wrong response type\")\n\t}\n\tif m.GetPrefix() != \"testm\" {\n\t\tt.Errorf(\"wrong prefix\")\n\t}\n\tif m.GetService() != fsvc {\n\t\tt.Errorf(\"could not retrieve sercvice\")\n\t}\n}", "title": "" }, { "docid": "5ec8a5f97f80bf852d66de805572f244", "score": "0.49728256", "text": "func (test *TestAssembly) Test(ctx context.Context, args []interface{}) ([]interface{}, error) {\n\treturn test.cfg.Test(ctx, args)\n}", "title": "" }, { "docid": "43e54ef899707aae6480b0c2cd58d8f6", "score": "0.49640322", "text": "func setTestTracef(prefix string, tracef TraceFunc) {\n\ttraceFuncsRW.Lock()\n\ttraceFuncs[prefix] = tracef\n\ttraceFuncsRW.Unlock()\n}", "title": "" }, { "docid": "7e31512cf4988cd776485061929f8a7b", "score": "0.49560532", "text": "func (tc *tCustomTesting) FailNow() {}", "title": "" }, { "docid": "cfffca27a23259024e0fa7a08fa6e1d3", "score": "0.49538445", "text": "func TestInit(t *testing.T) { fstests.TestInit(t) }", "title": "" }, { "docid": "db819d78c6ac3f4abad644df244e5d7a", "score": "0.49402884", "text": "func (self *codeGen) emitTest(line, a, c int) {\n\tself.emit(line, OP_TEST, a, 0, c)\n}", "title": "" }, { "docid": "b20b614e9d8d0b660954a94713de821a", "score": "0.49315095", "text": "func TestGet(t *testing.T) {\n\tt.Log(\"testing GET....\")\n}", "title": "" }, { "docid": "7ad1b31e0f8478dd4244d1ae97e354b1", "score": "0.4924252", "text": "func When(t *testing.T, context string, wrapper func(*testing.T)) {\n\tLog(\" When \", context, \"\\n\")\n\twrapper(t)\n}", "title": "" }, { "docid": "a66279eb04e9759ddc4bb8e356e0e757", "score": "0.4895202", "text": "func TestArithmetic(t *testing.T) { runTest(t, \"arith.go\") }", "title": "" }, { "docid": "1b2c6d168ad4a927149dc2c6ce298543", "score": "0.48798853", "text": "func (t *T) Method() {}", "title": "" }, { "docid": "fcf2bf71b2469afd7bb07bb5ff11b778", "score": "0.48790818", "text": "func Test(t *testing.T) {\n\tTestingT(t)\n}", "title": "" }, { "docid": "fcf2bf71b2469afd7bb07bb5ff11b778", "score": "0.48790818", "text": "func Test(t *testing.T) {\n\tTestingT(t)\n}", "title": "" }, { "docid": "fcf2bf71b2469afd7bb07bb5ff11b778", "score": "0.48790818", "text": "func Test(t *testing.T) {\n\tTestingT(t)\n}", "title": "" }, { "docid": "fcf2bf71b2469afd7bb07bb5ff11b778", "score": "0.48790818", "text": "func Test(t *testing.T) {\n\tTestingT(t)\n}", "title": "" }, { "docid": "fcf2bf71b2469afd7bb07bb5ff11b778", "score": "0.48790818", "text": "func Test(t *testing.T) {\n\tTestingT(t)\n}", "title": "" }, { "docid": "fcf2bf71b2469afd7bb07bb5ff11b778", "score": "0.48790818", "text": "func Test(t *testing.T) {\n\tTestingT(t)\n}", "title": "" }, { "docid": "fcf2bf71b2469afd7bb07bb5ff11b778", "score": "0.48790818", "text": "func Test(t *testing.T) {\n\tTestingT(t)\n}", "title": "" } ]
9789e0db2709e17aa9c3db1d555ade1a
GetCertificateProperties implements the CertificatePropertiesClassification interface for type CertificateProperties.
[ { "docid": "8a4428b3790eacd86906672f88496bbe", "score": "0.8049162", "text": "func (c *CertificateProperties) GetCertificateProperties() *CertificateProperties { return c }", "title": "" } ]
[ { "docid": "b6d3b2aeeac42cff6d24355de6f5f807", "score": "0.6159769", "text": "func (c *Client) GetTLSCertProps(configuration *rest.Config) (certProps tls.TlsCertificateProps, err error) {\n\tapiServerURL, err := url.Parse(configuration.Host)\n\tif err != nil {\n\t\treturn certProps, err\n\t}\n\tcertProps = tls.TlsCertificateProps{\n\t\tService: config.WebhookServiceName,\n\t\tNamespace: config.KubePolicyNamespace,\n\t\tApiServerHost: apiServerURL.Hostname(),\n\t}\n\treturn certProps, nil\n}", "title": "" }, { "docid": "8c7e2bb0579ca8f4c2b125f533f68040", "score": "0.60917693", "text": "func (c CertificateProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"deleteCertificateError\", c.DeleteCertificateError)\n\tpopulate(objectMap, \"format\", c.Format)\n\tpopulate(objectMap, \"previousProvisioningState\", c.PreviousProvisioningState)\n\tpopulateTimeRFC3339(objectMap, \"previousProvisioningStateTransitionTime\", c.PreviousProvisioningStateTransitionTime)\n\tpopulate(objectMap, \"provisioningState\", c.ProvisioningState)\n\tpopulateTimeRFC3339(objectMap, \"provisioningStateTransitionTime\", c.ProvisioningStateTransitionTime)\n\tpopulate(objectMap, \"publicData\", c.PublicData)\n\tpopulate(objectMap, \"thumbprint\", c.Thumbprint)\n\tpopulate(objectMap, \"thumbprintAlgorithm\", c.ThumbprintAlgorithm)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "0d4884b6cdbd0df5d8b568f7307034e0", "score": "0.58983374", "text": "func (s *Server) GetCertificates(\n\tw http.ResponseWriter,\n\tr *http.Request,\n\tparams GetCertificatesParams,\n) {\n\n\tcppkiParams := cppkiapi.GetCertificatesParams{\n\t\tIsdAs: (*cppkiapi.IsdAs)(params.IsdAs),\n\t\tValidAt: params.ValidAt,\n\t\tAll: params.All,\n\t}\n\ts.CPPKIServer.GetCertificates(w, r, cppkiParams)\n}", "title": "" }, { "docid": "dcb3d8bb28e82f811a22f1514db85165", "score": "0.58711463", "text": "func (c CertificateProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"activateDate\", c.ActivateDate)\n\tpopulate(objectMap, \"dnsNames\", c.DNSNames)\n\tpopulate(objectMap, \"expirationDate\", c.ExpirationDate)\n\tpopulate(objectMap, \"issuedDate\", c.IssuedDate)\n\tpopulate(objectMap, \"issuer\", c.Issuer)\n\tpopulate(objectMap, \"provisioningState\", c.ProvisioningState)\n\tpopulate(objectMap, \"subjectName\", c.SubjectName)\n\tpopulate(objectMap, \"thumbprint\", c.Thumbprint)\n\tobjectMap[\"type\"] = c.Type\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "4f374e762b2461ce0c7cc59742366511", "score": "0.57784677", "text": "func (c *CourseAuthor) GetCertificates() error {\n\treturn handler.Model(c).Related(&c.Certificates).Error\n}", "title": "" }, { "docid": "199ce5b877588e2f2009cae3ec6f0ed1", "score": "0.5728418", "text": "func (s *ServiceClient) GetProperties(ctx context.Context, o *ServiceGetPropertiesOptions) (ServiceGetPropertiesResponse, error) {\n\tgetPropertiesOptions := o.format()\n\tresp, err := s.client.GetProperties(ctx, getPropertiesOptions)\n\n\treturn toServiceGetPropertiesResponse(resp), handleError(err)\n}", "title": "" }, { "docid": "29bdcd8e2fd8a51db76234d935193e6a", "score": "0.57247096", "text": "func (c *CertificateProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"deleteCertificateError\":\n\t\t\terr = unpopulate(val, \"DeleteCertificateError\", &c.DeleteCertificateError)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"format\":\n\t\t\terr = unpopulate(val, \"Format\", &c.Format)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"previousProvisioningState\":\n\t\t\terr = unpopulate(val, \"PreviousProvisioningState\", &c.PreviousProvisioningState)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"previousProvisioningStateTransitionTime\":\n\t\t\terr = unpopulateTimeRFC3339(val, \"PreviousProvisioningStateTransitionTime\", &c.PreviousProvisioningStateTransitionTime)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"provisioningState\":\n\t\t\terr = unpopulate(val, \"ProvisioningState\", &c.ProvisioningState)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"provisioningStateTransitionTime\":\n\t\t\terr = unpopulateTimeRFC3339(val, \"ProvisioningStateTransitionTime\", &c.ProvisioningStateTransitionTime)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"publicData\":\n\t\t\terr = unpopulate(val, \"PublicData\", &c.PublicData)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"thumbprint\":\n\t\t\terr = unpopulate(val, \"Thumbprint\", &c.Thumbprint)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"thumbprintAlgorithm\":\n\t\t\terr = unpopulate(val, \"ThumbprintAlgorithm\", &c.ThumbprintAlgorithm)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5568776db9e07612f81c92b2b05e19a5", "score": "0.57187235", "text": "func (ab *Client) GetProperties(ctx context.Context, o *blob.GetPropertiesOptions) (blob.GetPropertiesResponse, error) {\n\treturn ab.BlobClient().GetProperties(ctx, o)\n}", "title": "" }, { "docid": "f8b9002b4d2cde4ecc2b45dc064596e6", "score": "0.5701428", "text": "func (p *Pool) GetCertificates() []*x509.Certificate {\n\tp.mu.RLock()\n\tdefer p.mu.RUnlock()\n\n\tcerts := make([]*x509.Certificate, len(p.certs))\n\tfor i := range p.certs {\n\t\tcerts[i] = p.certs[i].certificate\n\t}\n\treturn certs\n}", "title": "" }, { "docid": "adba579017fef7f8c8762097d701e232", "score": "0.56850284", "text": "func (k KeyVaultCertificateProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"activateDate\", k.ActivateDate)\n\tpopulate(objectMap, \"certVersion\", k.CertVersion)\n\tpopulate(objectMap, \"dnsNames\", k.DNSNames)\n\tpopulate(objectMap, \"excludePrivateKey\", k.ExcludePrivateKey)\n\tpopulate(objectMap, \"expirationDate\", k.ExpirationDate)\n\tpopulate(objectMap, \"issuedDate\", k.IssuedDate)\n\tpopulate(objectMap, \"issuer\", k.Issuer)\n\tpopulate(objectMap, \"keyVaultCertName\", k.KeyVaultCertName)\n\tpopulate(objectMap, \"provisioningState\", k.ProvisioningState)\n\tpopulate(objectMap, \"subjectName\", k.SubjectName)\n\tpopulate(objectMap, \"thumbprint\", k.Thumbprint)\n\tobjectMap[\"type\"] = \"KeyVaultCertificate\"\n\tpopulate(objectMap, \"vaultUri\", k.VaultURI)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "47cd236f12f50afa18a97f2dd7583c7f", "score": "0.5667279", "text": "func (s certificateService) Get(certificatesQuery CertificatesQuery) (*CertificateResources, error) {\n\tpath, err := s.getURITemplate().Expand(certificatesQuery)\n\tif err != nil {\n\t\treturn &CertificateResources{}, err\n\t}\n\n\tresponse, err := apiGet(s.getClient(), new(CertificateResources), path)\n\tif err != nil {\n\t\treturn &CertificateResources{}, err\n\t}\n\n\treturn response.(*CertificateResources), nil\n}", "title": "" }, { "docid": "f8e97a7f13987c2c626756e4ec2264e1", "score": "0.5664961", "text": "func (c *Client) UpdateCertificateProperties(ctx context.Context, certificateName string, properties Properties, options *UpdateCertificatePropertiesOptions) (UpdateCertificatePropertiesResponse, error) {\n\tif options == nil {\n\t\toptions = &UpdateCertificatePropertiesOptions{}\n\t}\n\tvar tags map[string]*string\n\tif properties.Tags != nil {\n\t\ttags = convertToGeneratedMap(properties.Tags)\n\t}\n\tresp, err := c.genClient.UpdateCertificate(\n\t\tctx,\n\t\tc.vaultURL,\n\t\tcertificateName,\n\t\toptions.Version,\n\t\tgenerated.CertificateUpdateParameters{\n\t\t\tCertificateAttributes: properties.toGenerated(),\n\t\t\tTags: tags,\n\t\t},\n\t\toptions.toGenerated(),\n\t)\n\tif err != nil {\n\t\treturn UpdateCertificatePropertiesResponse{}, err\n\t}\n\treturn UpdateCertificatePropertiesResponse{\n\t\tCertificate: certificateFromGenerated(&resp.CertificateBundle),\n\t}, nil\n}", "title": "" }, { "docid": "ff304f80178ea0ef0630871877eafb87", "score": "0.5643408", "text": "func (c *MockCore) GetProperties(id string, query string) (*prot.Properties, error) {\n\tc.LastGetProperties = GetPropertiesCall{ID: id, Query: query}\n\treturn &prot.Properties{\n\t\tProcessList: []prot.ProcessDetails{prot.ProcessDetails{ProcessID: 101}},\n\t}, c.behaviorResult()\n}", "title": "" }, { "docid": "312d4c57cd54491ebf266f5aa16ac586", "score": "0.5580276", "text": "func (c *Reconciler) GetCertificateLister() networkinglisters.CertificateLister {\n\treturn c.certificateLister\n}", "title": "" }, { "docid": "f763c0b4417fde65319e2ebbf8cbb8d9", "score": "0.557073", "text": "func (s *Server) GetCertificates(ctx context.Context, request *pb.GetCertificatesRequest) (*pb.GetCertificatesResponse, error) {\n\tcertInfo, err := s.manager.GetCertInfo()\n\tif err != nil {\n\t\trerr := fmt.Errorf(\"failed GetCertificates: %v\", err)\n\t\tlog.Error(rerr)\n\t\treturn nil, rerr\n\t}\n\tlog.Info(\"Success GetCertificates.\")\n\tr := []*pb.CertificateInfo{}\n\tfor _, ci := range certInfo {\n\t\tr = append(r, &pb.CertificateInfo{\n\t\t\tCertificateId: ci.certID,\n\t\t\tCertificate: &pb.Certificate{\n\t\t\t\tType: pb.CertificateType_CT_X509,\n\t\t\t\tCertificate: certPEMEncoder(ci.cert),\n\t\t\t},\n\t\t\tModificationTime: ci.updated.UnixNano(),\n\t\t})\n\t}\n\n\treturn &pb.GetCertificatesResponse{CertificateInfo: r}, nil\n}", "title": "" }, { "docid": "cec09e32f37a311232f58b496184414c", "score": "0.5553944", "text": "func (provider *PropertiesProvider) GetProperties(key string, queryOptions *api.QueryOptions, propsStruct interface{}) error {\n\tkvPair, _, err := provider.kv.Get(key, queryOptions)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif kvPair == nil {\n\t\treturn fmt.Errorf(\"No value for key '%s'\\n\", key)\n\t}\n\terr = json.Unmarshal(kvPair.Value, propsStruct)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f28ce5ff8953422ce2d57cf8e7c860ec", "score": "0.55098474", "text": "func (c ContentCertificateProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"activateDate\", c.ActivateDate)\n\tpopulate(objectMap, \"content\", c.Content)\n\tpopulate(objectMap, \"dnsNames\", c.DNSNames)\n\tpopulate(objectMap, \"expirationDate\", c.ExpirationDate)\n\tpopulate(objectMap, \"issuedDate\", c.IssuedDate)\n\tpopulate(objectMap, \"issuer\", c.Issuer)\n\tpopulate(objectMap, \"provisioningState\", c.ProvisioningState)\n\tpopulate(objectMap, \"subjectName\", c.SubjectName)\n\tpopulate(objectMap, \"thumbprint\", c.Thumbprint)\n\tobjectMap[\"type\"] = \"ContentCertificate\"\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "01de8ce9950b7fc1679b3b72385298ef", "score": "0.5506798", "text": "func (profiles *Profiles) GetPropertiesFor(loginName string) (ProfilePropsResp, error) {\n\tclient := NewHTTPClient(profiles.client)\n\tapiURL, _ := url.Parse(\n\t\tprofiles.endpoint +\n\t\t\t\"/GetPropertiesFor('\" + url.QueryEscape(loginName) + \"')\",\n\t)\n\tquery := apiURL.Query()\n\tfor k, v := range profiles.modifiers.Get() {\n\t\tquery.Set(k, TrimMultiline(v))\n\t}\n\tapiURL.RawQuery = query.Encode()\n\treturn client.Get(apiURL.String(), profiles.config)\n}", "title": "" }, { "docid": "063b4155d096ffa167ebd701366b537a", "score": "0.5470118", "text": "func GetAllProperties() map[string]*Property {\n\tinitProperties()\n\treturn properties\n}", "title": "" }, { "docid": "a2e949ec56b1199c3b2922553ae248aa", "score": "0.5446772", "text": "func (client *Client) GetCertificate(u *url.URL) (cert tls.Certificate, ok bool) {\n\tfor k, v := range client.prefixToCertificate {\n\t\tif strings.HasPrefix(u.String(), k) {\n\t\t\tcert = v\n\t\t\tok = true\n\t\t\treturn\n\t\t}\n\t}\n\treturn\n}", "title": "" }, { "docid": "f8137908773b8c6ef208389ed48cd1ef", "score": "0.54458237", "text": "func (s *ServerConnection) CertificatesGet(query SearchQuery) (CertificateList, int, error) {\n\tquery = addMissedParametersToSearchQuery(query)\n\tparams := struct {\n\t\tQuery SearchQuery `json:\"query\"`\n\t}{query}\n\tdata, err := s.CallRaw(\"Certificates.get\", params)\n\tif err != nil {\n\t\treturn nil, 0, err\n\t}\n\tcertificates := struct {\n\t\tResult struct {\n\t\t\tCertificates CertificateList `json:\"certificates\"`\n\t\t\tTotalItems int `json:\"totalItems\"`\n\t\t} `json:\"result\"`\n\t}{}\n\terr = json.Unmarshal(data, &certificates)\n\treturn certificates.Result.Certificates, certificates.Result.TotalItems, err\n}", "title": "" }, { "docid": "8c2c65411b2dcced6552067d7b4e81f6", "score": "0.543867", "text": "func (x X509CertificateProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tpopulate(objectMap, \"ekus\", x.Ekus)\n\tpopulate(objectMap, \"key_usage\", x.KeyUsage)\n\tpopulate(objectMap, \"subject\", x.Subject)\n\tpopulate(objectMap, \"sans\", x.SubjectAlternativeNames)\n\tpopulate(objectMap, \"validity_months\", x.ValidityInMonths)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "08b2016fe0789ccc1a22951ac6e72a47", "score": "0.5421537", "text": "func (o *CustomDevicePushMessage) GetProperties() map[string]string {\n\tif o == nil || o.Properties == nil {\n\t\tvar ret map[string]string\n\t\treturn ret\n\t}\n\treturn *o.Properties\n}", "title": "" }, { "docid": "6f19198bfb91f0a7ab9d982484a9067f", "score": "0.5421533", "text": "func (r *DeviceManagementUserPfxCertificatesCollectionRequest) Get(ctx context.Context) ([]UserPFXCertificate, error) {\n\treturn r.GetN(ctx, 0)\n}", "title": "" }, { "docid": "5f996c3fc56e51b44fa9648f6063ecc2", "score": "0.5391993", "text": "func (r *DeviceAppManagementEnterpriseCodeSigningCertificatesCollectionRequest) Get(ctx context.Context) ([]EnterpriseCodeSigningCertificate, error) {\n\tvar query string\n\tif r.query != nil {\n\t\tquery = \"?\" + r.query.Encode()\n\t}\n\treturn r.Paging(ctx, \"GET\", query, nil)\n}", "title": "" }, { "docid": "b5617e7c7a28fc829a4336e3c1a2accb", "score": "0.53899753", "text": "func (h *PropertyHolder) GetProperties(ctx context.Context) (*Properties, error) {\n\treturn NewDBusProperties(ctx, h.DBusObject)\n}", "title": "" }, { "docid": "57487153dc74432d8e883074ef65032a", "score": "0.5386084", "text": "func (k KeyVaultCertificateProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tk.CertificateProperties.marshalInternal(objectMap, \"KeyVaultCertificate\")\n\tpopulate(objectMap, \"certVersion\", k.CertVersion)\n\tpopulate(objectMap, \"excludePrivateKey\", k.ExcludePrivateKey)\n\tpopulate(objectMap, \"keyVaultCertName\", k.KeyVaultCertName)\n\tpopulate(objectMap, \"vaultUri\", k.VaultURI)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "22d90de2ab9a19ac8934808864bb2add", "score": "0.53647447", "text": "func (s certificateService) GetAll() ([]*CertificateResource, error) {\n\titems := []*CertificateResource{}\n\tpath, err := getAllPath(s)\n\tif err != nil {\n\t\treturn items, err\n\t}\n\n\t_, err = apiGet(s.getClient(), &items, path)\n\treturn items, err\n}", "title": "" }, { "docid": "9f6b5b6d1f17f817b80a3d0ce519e130", "score": "0.5330108", "text": "func (dev *Device) GetProperties() *Properties {\n\treturn &dev.Props\n}", "title": "" }, { "docid": "fbdb4bfab8b3b96d6f46459eda3ac16e", "score": "0.5325977", "text": "func (b BlobClient) GetProperties(ctx context.Context, options *GetBlobPropertiesOptions) (GetBlobPropertiesResponse, error) {\n\tbasics, lease, cpk, access := options.pointers()\n\tresp, err := b.client.GetProperties(ctx, basics, lease, cpk, access)\n\n\treturn resp.deserializeAttributes(), handleError(err)\n}", "title": "" }, { "docid": "f282a049bd00c41070ac51e9d88d1085", "score": "0.5318906", "text": "func (t *OpenconfigPlatform_Components_Component) GetProperties() *OpenconfigPlatform_Components_Component_Properties {\n\tif t != nil && t.Properties != nil {\n\t\treturn t.Properties\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f282a049bd00c41070ac51e9d88d1085", "score": "0.53171253", "text": "func (t *OpenconfigPlatform_Components_Component) GetProperties() *OpenconfigPlatform_Components_Component_Properties {\n\tif t != nil && t.Properties != nil {\n\t\treturn t.Properties\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c0991acfb780f336474176b8ffdace6d", "score": "0.53136986", "text": "func (s *API) GetCertificate(req *GetCertificateRequest, opts ...scw.RequestOption) (*Certificate, error) {\n\tvar err error\n\n\tif req.Region == \"\" {\n\t\tdefaultRegion, _ := s.client.GetDefaultRegion()\n\t\treq.Region = defaultRegion\n\t}\n\n\tif fmt.Sprint(req.Region) == \"\" {\n\t\treturn nil, errors.New(\"field Region cannot be empty in request\")\n\t}\n\n\tif fmt.Sprint(req.CertificateID) == \"\" {\n\t\treturn nil, errors.New(\"field CertificateID cannot be empty in request\")\n\t}\n\n\tscwReq := &scw.ScalewayRequest{\n\t\tMethod: \"GET\",\n\t\tPath: \"/lb/v1/regions/\" + fmt.Sprint(req.Region) + \"/certificates/\" + fmt.Sprint(req.CertificateID) + \"\",\n\t\tHeaders: http.Header{},\n\t}\n\n\tvar resp Certificate\n\n\terr = s.client.Do(scwReq, &resp, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "f754999c9f8c5898d806f0f406f9fee4", "score": "0.53081673", "text": "func (c *Connector) RetrieveCertificate(req *certificate.Request) (certificates *certificate.PEMCollection, err error) {\n\n\tif req.FetchPrivateKey {\n\t\treturn nil, fmt.Errorf(\"Failed to retrieve private key from Venafi Cloud service: not supported\")\n\t}\n\tif req.PickupID == \"\" && req.CertID == \"\" && req.Thumbprint != \"\" {\n\t\t// search cert by Thumbprint and fill pickupID\n\t\tvar certificateRequestId string\n\t\tsearchResult, err := c.searchCertificatesByFingerprint(req.Thumbprint)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"Failed to retrieve certificate: %s\", err)\n\t\t}\n\t\tif len(searchResult.Certificates) == 0 {\n\t\t\treturn nil, fmt.Errorf(\"No certifiate found using fingerprint %s\", req.Thumbprint)\n\t\t}\n\n\t\treqIds := []string{}\n\t\tisOnlyOneCertificateRequestId := true\n\t\tfor _, c := range searchResult.Certificates {\n\t\t\treqIds = append(reqIds, c.CertificateRequestId)\n\t\t\tif certificateRequestId != \"\" && certificateRequestId != c.CertificateRequestId {\n\t\t\t\tisOnlyOneCertificateRequestId = false\n\t\t\t}\n\t\t\tif c.CertificateRequestId != \"\" {\n\t\t\t\tcertificateRequestId = c.CertificateRequestId\n\t\t\t}\n\t\t\tif c.Id != \"\" {\n\t\t\t\treq.CertID = c.Id\n\t\t\t}\n\t\t}\n\t\tif !isOnlyOneCertificateRequestId {\n\t\t\treturn nil, fmt.Errorf(\"More than one CertificateRequestId was found with the same Fingerprint: %s\", reqIds)\n\t\t}\n\n\t\treq.PickupID = certificateRequestId\n\t}\n\n\tstartTime := time.Now()\n\t//Wait for certificate to be issued by checking it's PickupID\n\t//If certID is filled then certificate should be already issued.\n\tif req.CertID == \"\" {\n\t\tfor {\n\t\t\tif req.PickupID == \"\" {\n\t\t\t\tbreak\n\t\t\t}\n\t\t\tstatus, err := c.getCertificateStatus(req.PickupID)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, fmt.Errorf(\"unable to retrieve: %s\", err)\n\t\t\t}\n\t\t\tif status.Status == \"ISSUED\" {\n\t\t\t\tbreak // to fetch the cert itself\n\t\t\t} else if status.Status == \"FAILED\" {\n\t\t\t\treturn nil, fmt.Errorf(\"Failed to retrieve certificate. Status: %v\", status)\n\t\t\t}\n\t\t\t// status.Status == \"REQUESTED\" || status.Status == \"PENDING\"\n\t\t\tif req.Timeout == 0 {\n\t\t\t\treturn nil, endpoint.ErrCertificatePending{CertificateID: req.PickupID, Status: status.Status}\n\t\t\t}\n\t\t\tif time.Now().After(startTime.Add(req.Timeout)) {\n\t\t\t\treturn nil, endpoint.ErrRetrieveCertificateTimeout{CertificateID: req.PickupID}\n\t\t\t}\n\t\t\t// fmt.Printf(\"pending... %s\\n\", status.Status)\n\t\t\ttime.Sleep(2 * time.Second)\n\t\t}\n\t}\n\n\tif c.user == nil || c.user.Company == nil {\n\t\treturn nil, fmt.Errorf(\"Must be autheticated to retieve certificate\")\n\t}\n\n\tswitch {\n\tcase req.CertID != \"\":\n\t\turl := c.getURL(urlResourceCertificateRetrievePem)\n\t\turl = fmt.Sprintf(url, req.CertID)\n\t\tstatusCode, status, body, err := c.request(\"GET\", url, nil)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif statusCode != http.StatusOK {\n\t\t\treturn nil, fmt.Errorf(\"Failed to retrieve certificate. StatusCode: %d -- Status: %s -- Server Data: %s\", statusCode, status, body)\n\t\t}\n\t\treturn newPEMCollectionFromResponse(body, certificate.ChainOptionIgnore)\n\tcase req.PickupID != \"\":\n\t\turl := c.getURL(urlResourceCertificateRetrieveViaCSR)\n\t\turl = fmt.Sprintf(url, req.PickupID)\n\t\turl += \"?chainOrder=%s&format=PEM\"\n\t\tswitch req.ChainOption {\n\t\tcase certificate.ChainOptionRootFirst:\n\t\t\turl = fmt.Sprintf(url, condorChainOptionRootFirst)\n\t\tdefault:\n\t\t\turl = fmt.Sprintf(url, condorChainOptionRootLast)\n\t\t}\n\t\tstatusCode, status, body, err := c.request(\"GET\", url, nil)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif statusCode == http.StatusOK {\n\t\t\tcertificates, err = newPEMCollectionFromResponse(body, req.ChainOption)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\terr = req.CheckCertificate(certificates.Certificate)\n\t\t\treturn certificates, err\n\t\t} else if statusCode == http.StatusConflict { // Http Status Code 409 means the certificate has not been signed by the ca yet.\n\t\t\treturn nil, endpoint.ErrCertificatePending{CertificateID: req.PickupID}\n\t\t} else {\n\t\t\treturn nil, fmt.Errorf(\"Failed to retrieve certificate. StatusCode: %d -- Status: %s -- Server Data: %s\", statusCode, status, body) //todo:remove body from err\n\t\t}\n\t}\n\treturn nil, fmt.Errorf(\"Couldn't retrieve certificate because both PickupID and CertId are empty\")\n}", "title": "" }, { "docid": "bfc49e7f5f11fc59aff7f08efbb86353", "score": "0.53045535", "text": "func (s *Server) GetCertificate(w http.ResponseWriter, r *http.Request, chainID ChainID) {\n\ts.CPPKIServer.GetCertificate(w, r, cppkiapi.ChainID(chainID))\n}", "title": "" }, { "docid": "7b4a31e5c5a79d9360d5683e4d03f6ef", "score": "0.52943325", "text": "func GetPropertiesProvider() *PropertiesProvider {\n\tonceProps.Do(func() {\n\t\tconsulProvider := GetConsulProvider()\n\t\tkv := consulProvider.GetConsulKV()\n\t\tpropertiesProvider = &PropertiesProvider{kv}\n\t})\n\n\treturn propertiesProvider\n}", "title": "" }, { "docid": "416860e67508cfbeba1bffb15e717522", "score": "0.5276001", "text": "func (c ContentCertificateProperties) MarshalJSON() ([]byte, error) {\n\tobjectMap := make(map[string]interface{})\n\tc.CertificateProperties.marshalInternal(objectMap, \"ContentCertificate\")\n\tpopulate(objectMap, \"content\", c.Content)\n\treturn json.Marshal(objectMap)\n}", "title": "" }, { "docid": "2f755924a2c582a12a3fdcaf2eef2826", "score": "0.526842", "text": "func GetCertificates(certs map[string]string) ([]*x509.Certificate, error) {\n\tcertificates := []*x509.Certificate{}\n\n\tfor k, cert := range certs {\n\t\tblock, _ := pem.Decode([]byte(cert))\n\t\tcert, err := x509.ParseCertificate(block.Bytes)\n\t\tif err != nil {\n\t\t\treturn nil, fmt.Errorf(\"could not parse '%s' certificate: %w\", k, err)\n\t\t}\n\t\tlog.Printf(\"added cert: %s - %s\", k, cert.Subject)\n\t\tcertificates = append(certificates, cert)\n\t}\n\n\treturn certificates, nil\n}", "title": "" }, { "docid": "0122275d10ebca608a5dfa9483b0f71a", "score": "0.5258979", "text": "func (client BaseClient) GetCertificates(ctx context.Context, vaultBaseURL string, maxresults *int32) (result CertificateListResultPage, err error) {\n\tif tracing.IsEnabled() {\n\t\tctx = tracing.StartSpan(ctx, fqdn+\"/BaseClient.GetCertificates\")\n\t\tdefer func() {\n\t\t\tsc := -1\n\t\t\tif result.clr.Response.Response != nil {\n\t\t\t\tsc = result.clr.Response.Response.StatusCode\n\t\t\t}\n\t\t\ttracing.EndSpan(ctx, sc, err)\n\t\t}()\n\t}\n\tif err := validation.Validate([]validation.Validation{\n\t\t{TargetValue: maxresults,\n\t\t\tConstraints: []validation.Constraint{{Target: \"maxresults\", Name: validation.Null, Rule: false,\n\t\t\t\tChain: []validation.Constraint{{Target: \"maxresults\", Name: validation.InclusiveMaximum, Rule: int64(25), Chain: nil},\n\t\t\t\t\t{Target: \"maxresults\", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil},\n\t\t\t\t}}}}}); err != nil {\n\t\treturn result, validation.NewError(\"keyvault.BaseClient\", \"GetCertificates\", err.Error())\n\t}\n\n\tresult.fn = client.getCertificatesNextResults\n\treq, err := client.GetCertificatesPreparer(ctx, vaultBaseURL, maxresults)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"keyvault.BaseClient\", \"GetCertificates\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.GetCertificatesSender(req)\n\tif err != nil {\n\t\tresult.clr.Response = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"keyvault.BaseClient\", \"GetCertificates\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult.clr, err = client.GetCertificatesResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"keyvault.BaseClient\", \"GetCertificates\", resp, \"Failure responding to request\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "18d6b9eb82202170f455c61dc3328fed", "score": "0.5239476", "text": "func (mod *modContext) getProperties(properties []*schema.Property, lang string, input, nested bool) []property {\n\tif len(properties) == 0 {\n\t\treturn nil\n\t}\n\n\tdocProperties := make([]property, 0, len(properties))\n\tfor _, prop := range properties {\n\t\tif prop == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tcharacteristics := propertyCharacteristics{\n\t\t\tinput: input,\n\t\t\toptional: !prop.IsRequired,\n\t\t}\n\n\t\tlangDocHelper := getLanguageDocHelper(lang)\n\t\tvar propLangName string\n\t\tswitch lang {\n\t\tcase \"python\":\n\t\t\tpyName := python.PyName(prop.Name)\n\t\t\t// The default casing for a Python property name is snake_case unless\n\t\t\t// it is a property of a nested object, in which case, we should check the property\n\t\t\t// case maps.\n\t\t\tpropLangName = pyName\n\n\t\t\tif nested {\n\t\t\t\tif snakeCase, ok := camelCaseToSnakeCase[prop.Name]; ok {\n\t\t\t\t\tpropLangName = snakeCase\n\t\t\t\t} else if camelCase, ok := snakeCaseToCamelCase[pyName]; ok {\n\t\t\t\t\tpropLangName = camelCase\n\t\t\t\t} else {\n\t\t\t\t\t// If neither of the property case maps have the property\n\t\t\t\t\t// then use the default name of the property.\n\t\t\t\t\tpropLangName = prop.Name\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\tname, err := langDocHelper.GetPropertyName(prop)\n\t\t\tif err != nil {\n\t\t\t\tpanic(err)\n\t\t\t}\n\n\t\t\tpropLangName = name\n\t\t}\n\n\t\tdocProperties = append(docProperties, property{\n\t\t\tDisplayName: wbr(propLangName),\n\t\t\tName: propLangName,\n\t\t\tComment: prop.Comment,\n\t\t\tDeprecationMessage: prop.DeprecationMessage,\n\t\t\tIsRequired: prop.IsRequired,\n\t\t\tIsInput: input,\n\t\t\tType: mod.typeString(prop.Type, lang, characteristics, true),\n\t\t})\n\t}\n\n\treturn docProperties\n}", "title": "" }, { "docid": "1970076b73a600f7e56088cdfe2e7e67", "score": "0.51854926", "text": "func (m *ComplianceInformation) GetCertificationControls()([]CertificationControlable) {\n val, err := m.GetBackingStore().Get(\"certificationControls\")\n if err != nil {\n panic(err)\n }\n if val != nil {\n return val.([]CertificationControlable)\n }\n return nil\n}", "title": "" }, { "docid": "79833182ce88def6619344550db740be", "score": "0.51746243", "text": "func GetProperties(t reflect.Type) (*StructProperties, error) {\n\tk := t.Kind()\n\t// accept a pointer-to-struct as well (but just one level)\n\tif k == reflect.Ptr {\n\t\tt = t.Elem()\n\t\tk = t.Kind()\n\t}\n\tif k != reflect.Struct {\n\t\tpanic(\"protobuf3: type must have kind struct\")\n\t}\n\n\t// Most calls to GetProperties in a long-running program will be\n\t// retrieving details for types we have seen before.\n\tpropertiesMu.RLock()\n\tsprop, ok := propertiesMap[t]\n\tpropertiesMu.RUnlock()\n\tif ok {\n\t\treturn sprop, nil\n\t}\n\n\tpropertiesMu.Lock()\n\tsprop, err := getPropertiesLocked(t)\n\tpropertiesMu.Unlock()\n\treturn sprop, err\n}", "title": "" }, { "docid": "0106c87f82a32bc5134e82abd9760d07", "score": "0.517346", "text": "func (api *API) GetCertificate(c *common.Context) (interface{}, error) {\n\tns, n := c.GetNamespace(), c.GetNameFromParam()\n\tres, err := wrapCertificate(api.Secret.Get(ns, n, \"\"))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn hideCertKey(res), nil\n}", "title": "" }, { "docid": "cc2127ef8d02d38525a8d9eb21c418ac", "score": "0.5170088", "text": "func (m *Recipe) GetProperties() string {\n\tif m != nil {\n\t\treturn m.Properties\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "a92289271a2b60915c4de11516ca9911", "score": "0.51462644", "text": "func (o CertificateRequestStatusOutput) Certificate() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CertificateRequestStatus) *string { return v.Certificate }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "25811b713fe6ca285c7b0d0db4d1855b", "score": "0.5126583", "text": "func (c *Client) GetSSLCertificateList(ctx context.Context) ([]SSLCertificate, error) {\n\tr := gsRequest{\n\t\turi: apiSSLCertificateBase,\n\t\tmethod: http.MethodGet,\n\t\tskipCheckingRequest: true,\n\t}\n\n\tvar response SSLCertificateList\n\tvar sslCerts []SSLCertificate\n\terr := r.execute(ctx, *c, &response)\n\tfor _, properties := range response.List {\n\t\tsslCerts = append(sslCerts, SSLCertificate{Properties: properties})\n\t}\n\treturn sslCerts, err\n}", "title": "" }, { "docid": "f6418ea7849af2de730c50038946473e", "score": "0.5124276", "text": "func (c *Runtime) GetProperties(ctx context.Context, objectId string, ownProperties bool, accessorPropertiesOnly bool, generatePreview bool, nonIndexedPropertiesOnly bool) ([]*RuntimePropertyDescriptor, []*RuntimeInternalPropertyDescriptor, []*RuntimePrivatePropertyDescriptor, *RuntimeExceptionDetails, error) {\n\tvar v RuntimeGetPropertiesParams\n\tv.ObjectId = objectId\n\tv.OwnProperties = ownProperties\n\tv.AccessorPropertiesOnly = accessorPropertiesOnly\n\tv.GeneratePreview = generatePreview\n\tv.NonIndexedPropertiesOnly = nonIndexedPropertiesOnly\n\treturn c.GetPropertiesWithParams(ctx, &v)\n}", "title": "" }, { "docid": "05bf0e168b0383ff2717981329b79f65", "score": "0.5097299", "text": "func (o *SyntheticsTestRequest) GetCertificate() SyntheticsTestRequestCertificate {\n\tif o == nil || o.Certificate == nil {\n\t\tvar ret SyntheticsTestRequestCertificate\n\t\treturn ret\n\t}\n\treturn *o.Certificate\n}", "title": "" }, { "docid": "d0b4aaa9be2f5f93ee10d7d98cc744ca", "score": "0.5080664", "text": "func (h *Handler) GetCertificate(w http.ResponseWriter, r *http.Request) {\n\tacc, err := acme.AccountFromContext(r.Context())\n\tif err != nil {\n\t\tapi.WriteError(w, err)\n\t\treturn\n\t}\n\tcertID := chi.URLParam(r, \"certID\")\n\tcertBytes, err := h.Auth.GetCertificate(acc.GetID(), certID)\n\tif err != nil {\n\t\tapi.WriteError(w, err)\n\t\treturn\n\t}\n\n\tblock, _ := pem.Decode(certBytes)\n\tif block == nil {\n\t\tapi.WriteError(w, acme.ServerInternalErr(errors.New(\"failed to decode any certificates from generated certBytes\")))\n\t\treturn\n\t}\n\tcert, err := x509.ParseCertificate(block.Bytes)\n\tif err != nil {\n\t\tapi.WriteError(w, acme.Wrap(err, \"failed to parse generated leaf certificate\"))\n\t\treturn\n\t}\n\n\tapi.LogCertificate(w, cert)\n\tw.Header().Set(\"Content-Type\", \"application/pem-certificate-chain; charset=utf-8\")\n\tw.Write(certBytes)\n}", "title": "" }, { "docid": "ff45929c7aeec0629dd0db9ac633a8ee", "score": "0.50763285", "text": "func (o GetCustomDomainsDomainCertConfigOutput) Certificate() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GetCustomDomainsDomainCertConfig) string { return v.Certificate }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "27775467d120c09c22a6896c19887844", "score": "0.507301", "text": "func (o ClusterGetPropertiesResponseOutput) DiskEncryptionProperties() DiskEncryptionPropertiesResponsePtrOutput {\n\treturn o.ApplyT(func(v ClusterGetPropertiesResponse) *DiskEncryptionPropertiesResponse {\n\t\treturn v.DiskEncryptionProperties\n\t}).(DiskEncryptionPropertiesResponsePtrOutput)\n}", "title": "" }, { "docid": "04f9b82c34394878c0d0ae29829bf639", "score": "0.5068279", "text": "func (o ClusterGetPropertiesResponsePtrOutput) DiskEncryptionProperties() DiskEncryptionPropertiesResponsePtrOutput {\n\treturn o.ApplyT(func(v *ClusterGetPropertiesResponse) *DiskEncryptionPropertiesResponse {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.DiskEncryptionProperties\n\t}).(DiskEncryptionPropertiesResponsePtrOutput)\n}", "title": "" }, { "docid": "c65b3f2cb838f7aff07a3d8709030a88", "score": "0.5061016", "text": "func (r *Renewer) GetCertificate(hello *tls.ClientHelloInfo) (*tls.Certificate, error) {\n\treturn r.getCertificate(), nil\n}", "title": "" }, { "docid": "67e95632f22feada0a92500645886680", "score": "0.5051461", "text": "func GetCertificate(ctx *pulumi.Context,\n\tname string, id pulumi.IDInput, state *CertificateState, opts ...pulumi.ResourceOption) (*Certificate, error) {\n\tvar resource Certificate\n\terr := ctx.ReadResource(\"gcp:certificatemanager/certificate:Certificate\", name, id, state, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "068705afe0368e9fef84dfe003061495", "score": "0.50487036", "text": "func GetServiceProperties(ctx context.Context, q hcsschema.PropertyQuery) (*hcsschema.ServiceProperties, error) {\n\toperation := \"hcs::GetServiceProperties\"\n\n\tqueryb, err := json.Marshal(q)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpropertiesJSON, resultJSON, err := vmcompute.HcsGetServiceProperties(ctx, string(queryb))\n\tevents := processHcsResult(ctx, resultJSON)\n\tif err != nil {\n\t\treturn nil, &HcsError{Op: operation, Err: err, Events: events}\n\t}\n\n\tif propertiesJSON == \"\" {\n\t\treturn nil, ErrUnexpectedValue\n\t}\n\tproperties := &hcsschema.ServiceProperties{}\n\tif err := json.Unmarshal([]byte(propertiesJSON), properties); err != nil {\n\t\treturn nil, err\n\t}\n\treturn properties, nil\n}", "title": "" }, { "docid": "ab8b41108a142b6095a9aea9030fd85d", "score": "0.5043323", "text": "func (s *ZonedAPI) GetCertificate(req *ZonedAPIGetCertificateRequest, opts ...scw.RequestOption) (*Certificate, error) {\n\tvar err error\n\n\tif req.Zone == \"\" {\n\t\tdefaultZone, _ := s.client.GetDefaultZone()\n\t\treq.Zone = defaultZone\n\t}\n\n\tif fmt.Sprint(req.Zone) == \"\" {\n\t\treturn nil, errors.New(\"field Zone cannot be empty in request\")\n\t}\n\n\tif fmt.Sprint(req.CertificateID) == \"\" {\n\t\treturn nil, errors.New(\"field CertificateID cannot be empty in request\")\n\t}\n\n\tscwReq := &scw.ScalewayRequest{\n\t\tMethod: \"GET\",\n\t\tPath: \"/lb/v1/zones/\" + fmt.Sprint(req.Zone) + \"/certificates/\" + fmt.Sprint(req.CertificateID) + \"\",\n\t\tHeaders: http.Header{},\n\t}\n\n\tvar resp Certificate\n\n\terr = s.client.Do(scwReq, &resp, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resp, nil\n}", "title": "" }, { "docid": "d8381f0f174ca27ec426ca75cd0b1d2e", "score": "0.5035557", "text": "func (v *VirtualMachine) GetProperties() ([]GuestProperty, error) {\n\tinfo, err := core.ExecSubcommand(\"guestproperty\", \"enumerate\", v.UUID)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tprops := []GuestProperty{}\n\n\tif info == \"\" {\n\t\treturn props, nil\n\t}\n\n\tfor _, line := range strings.Split(info, \"\\n\") {\n\t\tprops = append(props, GuestProperty{}.FromString(line))\n\t}\n\n\tv.guestPoperties = props\n\n\treturn v.guestPoperties, nil\n}", "title": "" }, { "docid": "d139cbf1b52cfc71e17d4ec4fbe9e181", "score": "0.5024699", "text": "func (handle *Handle) GetProperties() ([]*Property, error) {\n\n\tvar properties []*Property\n\tif err := handle.DB.Select(\"id, user_id, address_one, address_two, state, city, zip_code\").Find(&properties).Error; err != nil {\n\t\treturn nil, err\n\t}\n\treturn properties, nil\n}", "title": "" }, { "docid": "8c44edd820a1804e2e049523c9ab5bd5", "score": "0.5024333", "text": "func GetCertificateMocked(t *testing.T, loadBalancerID string, certificateIn *types.Certificate) *types.Certificate {\n\n\tassert := assert.New(t)\n\n\t// wire up\n\tcs := &utils.MockConcertoService{}\n\tds, err := NewCertificateService(cs)\n\tassert.Nil(err, \"Couldn't load certificate service\")\n\tassert.NotNil(ds, \"Certificate service not instanced\")\n\n\t// to json\n\tdIn, err := json.Marshal(certificateIn)\n\tassert.Nil(err, \"Certificate test data corrupted\")\n\n\t// call service\n\tcs.On(\"Get\", fmt.Sprintf(APIPathNetworkLoadBalancerCertificate, loadBalancerID, certificateIn.ID)).\n\t\tReturn(dIn, 200, nil)\n\tcertificateOut, err := ds.GetCertificate(loadBalancerID, certificateIn.ID)\n\n\tassert.Nil(err, \"Error getting certificate\")\n\tassert.Equal(*certificateIn, *certificateOut, \"GetCertificate returned different certificate\")\n\n\treturn certificateOut\n}", "title": "" }, { "docid": "86da525157f17b5cb7422d1b23162112", "score": "0.5023164", "text": "func (q Querier) GetNetworkProperties(ctx context.Context, request *types.NetworkPropertiesRequest) (*types.NetworkPropertiesResponse, error) {\n\tsdkContext := sdk.UnwrapSDKContext(ctx)\n\n\tnetworkProperties := q.keeper.GetNetworkProperties(sdkContext)\n\treturn &types.NetworkPropertiesResponse{Properties: networkProperties}, nil\n}", "title": "" }, { "docid": "4c289d789cdb7ea83320e4d607051d47", "score": "0.50186706", "text": "func getPropertyRules(ctx context.Context, client papi.PAPI, version *papi.GetPropertyVersionsResponse) (*papi.GetRuleTreeResponse, error) {\n\n\treturn client.GetRuleTree(ctx, papi.GetRuleTreeRequest{\n\t\tPropertyID: version.PropertyID,\n\t\tPropertyVersion: version.Version.PropertyVersion,\n\t\tContractID: version.ContractID,\n\t\tGroupID: version.GroupID,\n\t\tRuleFormat: version.Version.RuleFormat,\n\t\tValidateRules: true,\n\t})\n}", "title": "" }, { "docid": "5f61f7e899aaff3026121346be204f21", "score": "0.5016399", "text": "func (r *DeviceAppManagementEnterpriseCodeSigningCertificatesCollectionRequest) Get(ctx context.Context) ([]EnterpriseCodeSigningCertificate, error) {\n\treturn r.GetN(ctx, 0)\n}", "title": "" }, { "docid": "a487c33aa6bd41cdc71318718be65610", "score": "0.50044423", "text": "func (profiles *Profiles) GetMyProperties() (ProfilePropsResp, error) {\n\tclient := NewHTTPClient(profiles.client)\n\tapiURL, _ := url.Parse(profiles.endpoint + \"/GetMyProperties\")\n\tquery := apiURL.Query()\n\tfor k, v := range profiles.modifiers.Get() {\n\t\tquery.Set(k, TrimMultiline(v))\n\t}\n\tapiURL.RawQuery = query.Encode()\n\treturn client.Post(apiURL.String(), nil, profiles.config)\n}", "title": "" }, { "docid": "d830cfc0efcbb81af546df1525c85ad5", "score": "0.5001004", "text": "func (i *Instance) GetProperties() (properties []Property, err error) {\n\tif err = i.BeginEnumeration(); err != nil {\n\t\treturn\n\t}\n\n\tfor done := false; !done; {\n\t\tvar name string\n\t\tvar value interface{}\n\n\t\tif done, name, value, _, _, err = i.Next(); err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tif !done {\n\t\t\tp := Property{\n\t\t\t\tName: name,\n\t\t\t\tValue: value,\n\t\t\t}\n\n\t\t\tproperties = append(properties, p)\n\t\t}\n\t}\n\n\ti.EndEnumeration()\n\treturn\n}", "title": "" }, { "docid": "404f496ccd5904134d4342a9e4932d25", "score": "0.49997425", "text": "func (in *Types) GetProperties(props map[string]resource.Property) string {\n\tlines := []string{}\n\n\tkeys := make([]string, 0, len(props))\n\tfor k := range props {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\n\tfor _, name := range keys {\n\t\tproperty := props[name]\n\t\toriginalname := name\n\t\tif resource.IdOrArn(originalname) && property.GetType() == \"String\" {\n\t\t\tname = resource.TrimIdOrArn(name) + \"Ref\"\n\t\t}\n\n\t\tif resource.IdsOrArns(originalname) && property.GetItemType() == \"String\" {\n\t\t\tname = resource.TrimIdsOrArns(name) + \"Refs\"\n\t\t}\n\n\t\t// TODO(christopherhein) implement tags\n\t\tif name == \"Tags\" {\n\t\t\t// fmt.Printf(\"tags resource found %+v\\n\", property)\n\t\t\tcontinue\n\t\t}\n\t\tlines = appendstrf(lines, `// %v %v`, name, property.GetDocumentation())\n\t\trequired := \"\"\n\t\tif !property.GetRequired() ||\n\t\t\toriginalname != in.Resource.Kind+\"Name\" ||\n\t\t\t!property.IsParameter() {\n\t\t\trequired = \",omitempty\"\n\t\t}\n\t\tparam := \"\"\n\t\tif property.IsParameter() {\n\t\t\tparam = \",Parameter\"\n\t\t}\n\n\t\tgoType := property.GetGoType(in.Resource.Kind)\n\t\tif resource.IdOrArn(originalname) && property.GetType() == \"String\" {\n\t\t\tgoType = \"metav1alpha1.ObjectReference\"\n\t\t}\n\n\t\tif resource.IdsOrArns(originalname) && property.GetItemType() == \"String\" {\n\t\t\tgoType = \"[]metav1alpha1.ObjectReference\"\n\t\t}\n\n\t\tlines = appendstrf(lines, `%v %v `+\"`\"+`json:\"%v%v\" cloudformation:\"%v%v\"`+\"`\", name, goType, lowerfirst(name), required, originalname, param)\n\t\tlines = appendblank(lines)\n\t}\n\treturn strings.Join(lines, \"\\n\")\n}", "title": "" }, { "docid": "4071570a549d843edc9266598af13350", "score": "0.49958226", "text": "func (c *CertificateProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn err\n\t}\n\treturn c.unmarshalInternal(rawMsg)\n}", "title": "" }, { "docid": "1557c1029732d28fd8582af2d5f05915", "score": "0.49957818", "text": "func (o *DeleteTagResultsItem) GetProperties() map[string]interface{} {\n\treturn o.additionalProperties\n}", "title": "" }, { "docid": "a43cefd698931f02657443fa475387b9", "score": "0.49848986", "text": "func (o *ProxyLBPrimaryCert) GetCertificateAltNames() string {\n\treturn o.CertificateAltNames\n}", "title": "" }, { "docid": "96a6911f88a1911231936d3f9d530ad6", "score": "0.49776158", "text": "func (c *CertificateClient) Get(ctx context.Context, id int) (*Certificate, error) {\n\treturn c.Query().Where(certificate.ID(id)).Only(ctx)\n}", "title": "" }, { "docid": "f3fa6171c6fe7dd4310d2b1ccdafa598", "score": "0.49743152", "text": "func (c *Client) NewListPropertiesOfCertificatesPager(options *ListCertificatesOptions) *runtime.Pager[ListPropertiesOfCertificatesResponse] {\n\tpager := c.genClient.NewGetCertificatesPager(c.vaultURL, nil)\n\treturn runtime.NewPager(runtime.PagingHandler[ListPropertiesOfCertificatesResponse]{\n\t\tMore: func(page ListPropertiesOfCertificatesResponse) bool {\n\t\t\treturn pager.More()\n\t\t},\n\t\tFetcher: func(ctx context.Context, cur *ListPropertiesOfCertificatesResponse) (ListPropertiesOfCertificatesResponse, error) {\n\t\t\tpage, err := pager.NextPage(ctx)\n\t\t\tif err != nil {\n\t\t\t\treturn ListPropertiesOfCertificatesResponse{}, err\n\t\t\t}\n\t\t\treturn listCertsPageFromGenerated(page), nil\n\t\t},\n\t})\n}", "title": "" }, { "docid": "cc7d472d388700e14a8c7ea722d5d9c4", "score": "0.49732903", "text": "func (k Keeper) GetProposedCertificate(ctx sdk.Context,\n\tsubject string, subjectKeyID string) types.ProposedCertificate {\n\tif !k.IsProposedCertificatePresent(ctx, subject, subjectKeyID) {\n\t\tpanic(\"Proposed Certificate does not exist\")\n\t}\n\n\tstore := ctx.KVStore(k.storeKey)\n\tbz := store.Get(types.GetProposedCertificateKey(subject, subjectKeyID))\n\n\tvar cert types.ProposedCertificate\n\n\tk.cdc.MustUnmarshalBinaryBare(bz, &cert)\n\n\treturn cert\n}", "title": "" }, { "docid": "7be4a9c22cebca8375fa5634306c3b83", "score": "0.49637875", "text": "func (c *ContentCertificateProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"activateDate\":\n\t\t\terr = unpopulate(val, \"ActivateDate\", &c.ActivateDate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"content\":\n\t\t\terr = unpopulate(val, \"Content\", &c.Content)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dnsNames\":\n\t\t\terr = unpopulate(val, \"DNSNames\", &c.DNSNames)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"expirationDate\":\n\t\t\terr = unpopulate(val, \"ExpirationDate\", &c.ExpirationDate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"issuedDate\":\n\t\t\terr = unpopulate(val, \"IssuedDate\", &c.IssuedDate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"issuer\":\n\t\t\terr = unpopulate(val, \"Issuer\", &c.Issuer)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"provisioningState\":\n\t\t\terr = unpopulate(val, \"ProvisioningState\", &c.ProvisioningState)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"subjectName\":\n\t\t\terr = unpopulate(val, \"SubjectName\", &c.SubjectName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"thumbprint\":\n\t\t\terr = unpopulate(val, \"Thumbprint\", &c.Thumbprint)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &c.Type)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", c, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1b246bcd9f51ad6e9d6759caccd35269", "score": "0.49591395", "text": "func (o ApnsChannelOutput) Certificate() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ApnsChannel) pulumi.StringPtrOutput { return v.Certificate }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0b2f8d5176229ba1afa408a69bf0139c", "score": "0.49518332", "text": "func (o CertificateRequestStatusPtrOutput) Certificate() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *CertificateRequestStatus) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Certificate\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "932893902b62fe2fa20984ad0bf9a27f", "score": "0.4950608", "text": "func (o CustomDomainCertConfigOutput) Certificate() pulumi.StringOutput {\n\treturn o.ApplyT(func(v CustomDomainCertConfig) string { return v.Certificate }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "ea1ab7d60e619c7e3b0c939a4e310ce4", "score": "0.4939648", "text": "func ExampleBlobServicesClient_GetServiceProperties() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclient, err := armstorage.NewBlobServicesClient(\"{subscription-id}\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tres, err := client.GetServiceProperties(ctx, \"res4410\", \"sto8607\", nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\t// TODO: use response item\n\t_ = res\n}", "title": "" }, { "docid": "47829ba43ad82af2564fbb407db7dd95", "score": "0.49310005", "text": "func (o ClusterCreatePropertiesPtrOutput) DiskEncryptionProperties() DiskEncryptionPropertiesPtrOutput {\n\treturn o.ApplyT(func(v *ClusterCreateProperties) *DiskEncryptionProperties {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.DiskEncryptionProperties\n\t}).(DiskEncryptionPropertiesPtrOutput)\n}", "title": "" }, { "docid": "e0911141e819a4cc5aedeb308b9f54ee", "score": "0.49223682", "text": "func (acd *AbstractCLIDriver) GetPropertiesPath() string {\n\treturn acd.propertiesPath\n}", "title": "" }, { "docid": "f6df5d130de38e5448ac75cb443335f8", "score": "0.49193847", "text": "func (f *File) GetDocProps() (ret *DocProperties, err error) {\n\tvar core = new(decodeCoreProperties)\n\n\tif err = f.xmlNewDecoder(bytes.NewReader(namespaceStrictToTransitional(f.readXML(\"docProps/core.xml\")))).\n\t\tDecode(core); err != nil && err != io.EOF {\n\t\terr = fmt.Errorf(\"xml decode error: %s\", err)\n\t\treturn\n\t}\n\tret, err = &DocProperties{\n\t\tCategory: core.Category,\n\t\tContentStatus: core.ContentStatus,\n\t\tCreated: core.Created.Text,\n\t\tCreator: core.Creator,\n\t\tDescription: core.Description,\n\t\tIdentifier: core.Identifier,\n\t\tKeywords: core.Keywords,\n\t\tLastModifiedBy: core.LastModifiedBy,\n\t\tModified: core.Modified.Text,\n\t\tRevision: core.Revision,\n\t\tSubject: core.Subject,\n\t\tTitle: core.Title,\n\t\tLanguage: core.Language,\n\t\tVersion: core.Version,\n\t}, nil\n\n\treturn\n}", "title": "" }, { "docid": "cb5efb3e5696db88564dd3e361c2e6e5", "score": "0.49105513", "text": "func (ca *Cloud) GetProperties() *AssetProperties {\n\treturn ca.Properties\n}", "title": "" }, { "docid": "fa391f79f49f185b0dce068eee848706", "score": "0.49072102", "text": "func (client GlobalClient) GetAllCertificates(ctx context.Context) (result CertificateCollectionPage, err error) {\n\tif tracing.IsEnabled() {\n\t\tctx = tracing.StartSpan(ctx, fqdn+\"/GlobalClient.GetAllCertificates\")\n\t\tdefer func() {\n\t\t\tsc := -1\n\t\t\tif result.cc.Response.Response != nil {\n\t\t\t\tsc = result.cc.Response.Response.StatusCode\n\t\t\t}\n\t\t\ttracing.EndSpan(ctx, sc, err)\n\t\t}()\n\t}\n\tresult.fn = client.getAllCertificatesNextResults\n\treq, err := client.GetAllCertificatesPreparer(ctx)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"web.GlobalClient\", \"GetAllCertificates\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.GetAllCertificatesSender(req)\n\tif err != nil {\n\t\tresult.cc.Response = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"web.GlobalClient\", \"GetAllCertificates\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult.cc, err = client.GetAllCertificatesResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"web.GlobalClient\", \"GetAllCertificates\", resp, \"Failure responding to request\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "ace65d40e2d3944d4f5092d2f4231038", "score": "0.4905195", "text": "func (d *Disk) GetProperties() *AssetProperties {\n\treturn d.Properties\n}", "title": "" }, { "docid": "0aeeaee12adfb99a245f1eacaa4ad483", "score": "0.49043202", "text": "func (o *ApplianceCertificateSettingAllOf) GetCertificate() IamCertificateRelationship {\n\tif o == nil || o.Certificate == nil {\n\t\tvar ret IamCertificateRelationship\n\t\treturn ret\n\t}\n\treturn *o.Certificate\n}", "title": "" }, { "docid": "9e2a246196a2bb54fff4881aa8c624ee", "score": "0.49024045", "text": "func (k *KeyVaultCertificateProperties) UnmarshalJSON(data []byte) error {\n\tvar rawMsg map[string]json.RawMessage\n\tif err := json.Unmarshal(data, &rawMsg); err != nil {\n\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", k, err)\n\t}\n\tfor key, val := range rawMsg {\n\t\tvar err error\n\t\tswitch key {\n\t\tcase \"activateDate\":\n\t\t\terr = unpopulate(val, \"ActivateDate\", &k.ActivateDate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"certVersion\":\n\t\t\terr = unpopulate(val, \"CertVersion\", &k.CertVersion)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"dnsNames\":\n\t\t\terr = unpopulate(val, \"DNSNames\", &k.DNSNames)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"excludePrivateKey\":\n\t\t\terr = unpopulate(val, \"ExcludePrivateKey\", &k.ExcludePrivateKey)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"expirationDate\":\n\t\t\terr = unpopulate(val, \"ExpirationDate\", &k.ExpirationDate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"issuedDate\":\n\t\t\terr = unpopulate(val, \"IssuedDate\", &k.IssuedDate)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"issuer\":\n\t\t\terr = unpopulate(val, \"Issuer\", &k.Issuer)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"keyVaultCertName\":\n\t\t\terr = unpopulate(val, \"KeyVaultCertName\", &k.KeyVaultCertName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"provisioningState\":\n\t\t\terr = unpopulate(val, \"ProvisioningState\", &k.ProvisioningState)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"subjectName\":\n\t\t\terr = unpopulate(val, \"SubjectName\", &k.SubjectName)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"thumbprint\":\n\t\t\terr = unpopulate(val, \"Thumbprint\", &k.Thumbprint)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"type\":\n\t\t\terr = unpopulate(val, \"Type\", &k.Type)\n\t\t\tdelete(rawMsg, key)\n\t\tcase \"vaultUri\":\n\t\t\terr = unpopulate(val, \"VaultURI\", &k.VaultURI)\n\t\t\tdelete(rawMsg, key)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"unmarshalling type %T: %v\", k, err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e320313e2a03b6c28561c7f66c4ae3f4", "score": "0.48999307", "text": "func (c *Runtime) GetPropertiesWithParams(ctx context.Context, v *RuntimeGetPropertiesParams) ([]*RuntimePropertyDescriptor, []*RuntimeInternalPropertyDescriptor, []*RuntimePrivatePropertyDescriptor, *RuntimeExceptionDetails, error) {\n\tresp, err := c.target.SendCustomReturn(ctx, &gcdmessage.ParamRequest{Id: c.target.GetId(), Method: \"Runtime.getProperties\", Params: v})\n\tif err != nil {\n\t\treturn nil, nil, nil, nil, err\n\t}\n\n\tvar chromeData struct {\n\t\tResult struct {\n\t\t\tResult []*RuntimePropertyDescriptor\n\t\t\tInternalProperties []*RuntimeInternalPropertyDescriptor\n\t\t\tPrivateProperties []*RuntimePrivatePropertyDescriptor\n\t\t\tExceptionDetails *RuntimeExceptionDetails\n\t\t}\n\t}\n\n\tif resp == nil {\n\t\treturn nil, nil, nil, nil, &gcdmessage.ChromeEmptyResponseErr{}\n\t}\n\n\t// test if error first\n\tcerr := &gcdmessage.ChromeErrorResponse{}\n\tjson.Unmarshal(resp.Data, cerr)\n\tif cerr != nil && cerr.Error != nil {\n\t\treturn nil, nil, nil, nil, &gcdmessage.ChromeRequestErr{Resp: cerr}\n\t}\n\n\tif err := json.Unmarshal(resp.Data, &chromeData); err != nil {\n\t\treturn nil, nil, nil, nil, err\n\t}\n\n\treturn chromeData.Result.Result, chromeData.Result.InternalProperties, chromeData.Result.PrivateProperties, chromeData.Result.ExceptionDetails, nil\n}", "title": "" }, { "docid": "73265f878cac25328084f7780f288bb8", "score": "0.4895131", "text": "func (kc *KindConfig) Properties() []*Property { return kc.properties }", "title": "" }, { "docid": "77e096d977485e72787060dc33ee2505", "score": "0.489473", "text": "func (b *BigIP) GetCertificate(name string) (*Certificate, error) {\n\tvar cert Certificate\n\terr, ok := b.getForEntity(&cert, uriSys, uriFile, uriSslCert, name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif !ok {\n\t\treturn nil, nil\n\t}\n\n\treturn &cert, nil\n}", "title": "" }, { "docid": "5b0488297ca1c0ffc9bf8f4993ff3316", "score": "0.48896644", "text": "func (o *ServiceSpecificationDto) GetCommerceProperties() ServiceSpecificationCommercePropertiesDto {\n\tif o == nil || IsNil(o.CommerceProperties) {\n\t\tvar ret ServiceSpecificationCommercePropertiesDto\n\t\treturn ret\n\t}\n\treturn *o.CommerceProperties\n}", "title": "" }, { "docid": "dd6c2c287c70f0e8af6e2e3a1c3f2918", "score": "0.4888594", "text": "func (sd *SignedData) GetCertificates() ([]*x509.Certificate, error) {\n\tif len(sd.Certificates.Bytes) == 0 {\n\t\treturn nil, ErrNoCertificate\n\t}\n\treturn x509.ParseCertificates(sd.Certificates.Bytes)\n}", "title": "" }, { "docid": "c256c5f305bd094a9a49954e98685bd5", "score": "0.48880303", "text": "func (*SSHCertificate) AttributeSpecifications() map[string]elemental.AttributeSpecification {\n\n\treturn SSHCertificateAttributesMap\n}", "title": "" }, { "docid": "b6c44a99eab3ab1a598ff875abbba43e", "score": "0.48809358", "text": "func (client BaseClient) GetCertificatePolicy(ctx context.Context, vaultBaseURL string, certificateName string) (result CertificatePolicy, err error) {\n\tif tracing.IsEnabled() {\n\t\tctx = tracing.StartSpan(ctx, fqdn+\"/BaseClient.GetCertificatePolicy\")\n\t\tdefer func() {\n\t\t\tsc := -1\n\t\t\tif result.Response.Response != nil {\n\t\t\t\tsc = result.Response.Response.StatusCode\n\t\t\t}\n\t\t\ttracing.EndSpan(ctx, sc, err)\n\t\t}()\n\t}\n\treq, err := client.GetCertificatePolicyPreparer(ctx, vaultBaseURL, certificateName)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"keyvault.BaseClient\", \"GetCertificatePolicy\", nil, \"Failure preparing request\")\n\t\treturn\n\t}\n\n\tresp, err := client.GetCertificatePolicySender(req)\n\tif err != nil {\n\t\tresult.Response = autorest.Response{Response: resp}\n\t\terr = autorest.NewErrorWithError(err, \"keyvault.BaseClient\", \"GetCertificatePolicy\", resp, \"Failure sending request\")\n\t\treturn\n\t}\n\n\tresult, err = client.GetCertificatePolicyResponder(resp)\n\tif err != nil {\n\t\terr = autorest.NewErrorWithError(err, \"keyvault.BaseClient\", \"GetCertificatePolicy\", resp, \"Failure responding to request\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "10f41dc21e1d0b6d10020d593888e012", "score": "0.4869554", "text": "func (p *Proxy) RetrieveCertificateByThumbprint(thumprint string) (*certificate.PEMCollection, error) {\n\tpickupReq := &certificate.Request{\n\t\tThumbprint: thumprint,\n\t\tTimeout: 180 * time.Second,\n\t}\n\n\treturn p.Client.RetrieveCertificate(pickupReq)\n}", "title": "" }, { "docid": "73218d2cae6d663495fcb0fba380b10f", "score": "0.48680732", "text": "func getCertificates(ctx context.Context, certs []*x509.Certificate) string {\n\tvar headerValues []string\n\n\tfor _, peerCert := range certs {\n\t\theaderValues = append(headerValues, extractCertificate(ctx, peerCert))\n\t}\n\n\treturn strings.Join(headerValues, certSeparator)\n}", "title": "" }, { "docid": "5d55c432bb8ff7afe3c65b0674fed607", "score": "0.48576382", "text": "func (i *infoService) PublicCertificates() (certs []infoS.Certificate, err error) {\n\treturn nil, ErrNotImplemented\n}", "title": "" }, { "docid": "421486aa21a4cc31359215b775805e5d", "score": "0.48574364", "text": "func (identityService *IdentityService) getCertificate(vm *duktape.Context) (result int) {\n\tlogger.Debug(\"Entering IdentityService.getCertificate\", vm)\n\tdefer func() { logger.Debug(\"Exiting IdentityService.getCertificate\", result) }()\n\n\t// Return the certificate.\n\tvm.PushString(\"\")\n\treturn 1\n}", "title": "" }, { "docid": "ce8719de09fee6aa69e1b9be32859ed8", "score": "0.48561922", "text": "func (c Client) FetchCertificates(account Account, certificateURL string) ([]*x509.Certificate, error) {\n\tresp, body, err := c.postRaw(0, certificateURL, account.URL, account.PrivateKey, \"\", []int{http.StatusOK})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn c.decodeCertificateChain(body, resp, account)\n}", "title": "" }, { "docid": "29d2a73d871a63100ecc490bc58c83a0", "score": "0.48546866", "text": "func (cw *certificateFileReader) GetCertificate(clientHelloInfo *tls.ClientHelloInfo) (*tls.Certificate, error) {\n\tcw.logger.\n\t\tWithField(certFileField, cw.certFile).\n\t\tWithField(keyFileField, cw.keyFile).\n\t\tTracef(\"reloading certificates...\")\n\n\tcert, err := tls.LoadX509KeyPair(cw.certFile, cw.keyFile)\n\n\tif err != nil {\n\t\tcw.logger.\n\t\t\tWithField(certFileField, cw.certFile).\n\t\t\tWithField(keyFileField, cw.keyFile).\n\t\t\tWithError(err).\n\t\t\tErrorf(\"certificates reloading failed.\")\n\n\t\treturn nil, err\n\t}\n\n\treturn &cert, nil\n}", "title": "" }, { "docid": "62a5d5095df68353e8aaeba5275848c7", "score": "0.4854075", "text": "func ConvertTLSPropertiesToTLSConfig(properties TLSProperties) (*tls.Config, error) {\n\ttlsConfig := new(tls.Config)\n\n\tif properties.ClientCert != \"\" && properties.ClientKey != \"\" {\n\t\tcert, err := tls.X509KeyPair([]byte(properties.ClientCert), []byte(properties.ClientKey))\n\t\tif err != nil {\n\t\t\treturn tlsConfig, fmt.Errorf(\"unable to load client certificate and key pair. Err: %v\", err)\n\t\t}\n\t\ttlsConfig.Certificates = []tls.Certificate{cert}\n\t}\n\n\tif properties.CACert != \"\" {\n\t\ttlsConfig.RootCAs = x509.NewCertPool()\n\t\tif ok := tlsConfig.RootCAs.AppendCertsFromPEM([]byte(properties.CACert)); !ok {\n\t\t\treturn tlsConfig, fmt.Errorf(\"unable to load CA certificate\")\n\t\t}\n\t}\n\n\treturn tlsConfig, nil\n}", "title": "" }, { "docid": "ba5003eeffe1cccc6955cf69b95da0ce", "score": "0.4850613", "text": "func Certificate(\n\tctx context.Context,\n\tlog logr.Logger,\n\tc client.Client,\n\tdesiredCertificate *certv1alpha2.Certificate,\n) (currentCertificate *certv1alpha2.Certificate, err error) {\n\tnn := types.NamespacedName{\n\t\tName: desiredCertificate.Name,\n\t\tNamespace: desiredCertificate.Namespace,\n\t}\n\tcurrentCertificate = &certv1alpha2.Certificate{}\n\terr = c.Get(ctx, nn, currentCertificate)\n\tif err != nil && !errors.IsNotFound(err) {\n\t\treturn currentCertificate, fmt.Errorf(\"getting Certificate: %w\", err)\n\t}\n\tif errors.IsNotFound(err) {\n\t\t// Create missing Certificate\n\t\tlog.V(1).Info(\"creating\", \"Certificate\", nn.String())\n\t\tif err = c.Create(ctx, desiredCertificate); err != nil {\n\t\t\treturn currentCertificate, fmt.Errorf(\"creating Certificate: %w\", err)\n\t\t}\n\t}\n\treturn currentCertificate, nil\n}", "title": "" }, { "docid": "f7646e859c6d9064cce8b29b2c1849cf", "score": "0.48496062", "text": "func (o CertificateAuthorityClientOutput) Certificate() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v CertificateAuthorityClient) *string { return v.Certificate }).(pulumi.StringPtrOutput)\n}", "title": "" } ]
00b6aa0dc82dc9d6f188347a7feb1d9d
parse reads a serialized attribute from r and parses it into this NLAttr instance.
[ { "docid": "8fe42e7d2fce11fe24d0e153e767d4c0", "score": "0.7107415", "text": "func (a *NLAttr) parse(r *bytes.Reader) error {\n\tif r.Len() < syscall.NLA_HDRLEN {\n\t\treturn errors.New(\"Truncated attribute\")\n\t}\n\tvar alen uint16\n\tbinary.Read(r, native, &alen)\n\tbinary.Read(r, native, &a.Type)\n\n\tif alen < syscall.NLA_HDRLEN || int(alen-syscall.NLA_HDRLEN) > r.Len() {\n\t\treturn errors.New(\"Truncated attribute\")\n\t}\n\talen -= syscall.NLA_HDRLEN\n\tif alen == 0 {\n\t\ta.Data = nil\n\t\treturn nil\n\t}\n\n\ta.Data = make([]byte, alen)\n\tr.Read(a.Data)\n\tpadlen := nlaAlignOf(int(alen)) - int(alen)\n\tfor i := 0; i < padlen; i++ {\n\t\tr.ReadByte()\n\t}\n\treturn nil\n}", "title": "" } ]
[ { "docid": "4a11a67fc1a1414be7e3b40e01b67ce4", "score": "0.58566576", "text": "func ParseAttr(r *bytes.Reader) (*NLAttr, error) {\n\tattr := &NLAttr{}\n\tif err := attr.parse(r); err != nil {\n\t\treturn nil, err\n\t}\n\treturn attr, nil\n}", "title": "" }, { "docid": "6bc4dd7b125cf1b5e350c9170e402517", "score": "0.5223244", "text": "func Parse(r io.Reader) (attrs map[string]string, data []byte, err error) {\n\tattrs = make(map[string]string)\n\tscanner := bufio.NewScanner(r)\n\n\t// Scan all attributes into the map.\n\tfor scanner.Scan() {\n\t\tb := scanner.Bytes()\n\t\tns := bytes.TrimSpace(b)\n\t\tif len(ns) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tif ns[0] != '+' {\n\t\t\t// With whitespace removed, the line has another non-plus character\n\t\t\t// so stop scanning for attributes.\n\t\t\tdata = append(data, b...)\n\t\t\tdata = append(data, '\\n')\n\t\t\tbreak\n\t\t}\n\n\t\tns = ns[1:] // Trim prefixed +\n\t\tsplit := bytes.SplitN(ns, []byte{'='}, 2)\n\t\tif len(split) != 2 {\n\t\t\tcontinue // Ignore invalid lines.\n\t\t}\n\t\tvarName := string(bytes.TrimSpace(split[0]))\n\t\tvarValue := string(bytes.TrimSpace(split[1]))\n\t\tattrs[varName] = varValue\n\t}\n\n\t// Attribute scanning stops at the first blank line, scan the rest.\n\tfor scanner.Scan() {\n\t\tb := scanner.Bytes()\n\t\tdata = append(data, b...)\n\t\tdata = append(data, '\\n')\n\t}\n\n\t// Pass any scanner errors to the caller.\n\terr = scanner.Err()\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn\n}", "title": "" }, { "docid": "8acda0881706950ea45d5b46bfcbc9d2", "score": "0.51786464", "text": "func (c *ReadAuthenticatedPayloadTimeoutRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "8acda0881706950ea45d5b46bfcbc9d2", "score": "0.51786464", "text": "func (c *ReadAuthenticatedPayloadTimeoutRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "737322ca22b9056a53bfaf4a26c960ba", "score": "0.51755375", "text": "func (c *RoleDiscoveryRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "e513de8ceda4fefa46fa71ad28c249ba", "score": "0.51754403", "text": "func (m *Rgetattr) Decode(buf *binary.Buffer) {\n\tDecodeRgetattr(buf, &m.Valid, m.Stat_t)\n}", "title": "" }, { "docid": "afd3903f52f6fab7bb90b35a6a78552f", "score": "0.51678646", "text": "func (a *Attribute) decode(ad *netlink.AttributeDecoder) error {\n\n\tfor ad.Next() {\n\n\t\t// Copy the netlink attribute's fields into the netfilter attribute.\n\t\tnfa := Attribute{\n\t\t\t// Only consider the rightmost 14 bits for Type.\n\t\t\t// ad.Type implicitly masks the Nested and NetByteOrder bits.\n\t\t\tType: ad.Type(),\n\t\t\tData: ad.Bytes(),\n\t\t}\n\n\t\t// Boolean flags extracted from the two leftmost bits of Type.\n\t\tnfa.Nested = ad.TypeFlags()&netlink.Nested != 0\n\t\tnfa.NetByteOrder = ad.TypeFlags()&netlink.NetByteOrder != 0\n\n\t\tif nfa.NetByteOrder && nfa.Nested {\n\t\t\treturn errInvalidAttributeFlags\n\t\t}\n\n\t\t// Unmarshal recursively if the netlink Nested flag is set.\n\t\tif nfa.Nested {\n\t\t\tad.Nested(nfa.decode)\n\t\t}\n\n\t\ta.Children = append(a.Children, nfa)\n\t}\n\n\treturn ad.Err()\n}", "title": "" }, { "docid": "8aa09dfa9caccd1b9395469ee70e0c1a", "score": "0.51505125", "text": "func (m *NfNlMessage) parseAttributes(r *bytes.Reader) error {\n\tfor r.Len() >= syscall.NLA_HDRLEN {\n\t\tattr, err := ParseAttr(r)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tm.AddAttribute(attr)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "62aab32899487d6350e35d5702ff3a68", "score": "0.5140545", "text": "func UnmarshalFrom(r io.Reader, val interface{}) (err error) {\n\tresult, _ := DecodeFrom(r)\n\n\tvalue := reflect.ValueOf(val).Elem()\n\n\tswitch v := value; v.Kind() {\n\tcase reflect.Struct:\n\t\tslice := reflect.ValueOf(result)\n\t\tfor i := 0; i < slice.Len(); i++ {\n\t\t\te := slice.Index(i).Elem()\n\t\t\tv.Field(i).Set(e)\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ba34c46c286bcb3ede911e8ea5234534", "score": "0.51293033", "text": "func (m *Register) Deserialize(r io.Reader) error {\r\n\tif err := binary.Read(r, Endian, &m.Version); err != nil {\r\n\t\treturn errors.Wrap(err, \"version\")\r\n\t}\r\n\r\n\tif err := m.Key.Deserialize(r); err != nil {\r\n\t\treturn errors.Wrap(err, \"key\")\r\n\t}\r\n\r\n\tif err := m.Hash.Deserialize(r); err != nil {\r\n\t\treturn errors.Wrap(err, \"hash\")\r\n\t}\r\n\r\n\tif err := binary.Read(r, Endian, &m.StartBlockHeight); err != nil {\r\n\t\treturn errors.Wrap(err, \"start block height\")\r\n\t}\r\n\r\n\tif err := m.ChainTip.Deserialize(r); err != nil {\r\n\t\treturn errors.Wrap(err, \"chain tip\")\r\n\t}\r\n\r\n\tif err := binary.Read(r, Endian, &m.ConnectionType); err != nil {\r\n\t\treturn errors.Wrap(err, \"connection type\")\r\n\t}\r\n\r\n\tif err := m.Signature.Deserialize(r); err != nil {\r\n\t\treturn errors.Wrap(err, \"signature\")\r\n\t}\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "2970e902fa6e486508c76d15323476a5", "score": "0.5091387", "text": "func (e *Entry) fromRawTorrentAttribute(raw rawAttribute) error {\n\ttorrent, ok := e.File.(*TorrentFile)\n\tif !ok && e.File != nil {\n\t\treturn errors.Errorf(\"encountered Torrent specific attribute but File implementation is not set to Torrent\")\n\t} else if !ok {\n\t\te.File = new(TorrentFile)\n\t\ttorrent = e.File.(*TorrentFile)\n\t}\n\n\tswitch raw.Name {\n\tcase \"size\":\n\t\tparsedUint, err := strconv.ParseUint(raw.Value, 10, 64)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing torrent contents size: %v\", 1, raw.Value)\n\t\t}\n\t\ttorrent.ContentsSize = parsedUint\n\tcase \"seeders\":\n\t\tparsedUint, err := strconv.ParseUint(raw.Value, 10, 64)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing number of seeders: %v\", 1, raw.Value)\n\t\t}\n\t\ttorrent.Seeders = parsedUint\n\tcase \"peers\":\n\t\tparsedUint, err := strconv.ParseUint(raw.Value, 10, 64)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing number of peers: %v\", 1, raw.Value)\n\t\t}\n\t\ttorrent.Peers = parsedUint\n\tcase \"infohash\":\n\t\tparsedHex, err := hex.DecodeString(raw.Value)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing infohash: %v\", 1, raw.Value)\n\t\t}\n\t\ttorrent.InfoHash = parsedHex\n\tdefault:\n\t\treturn errors.Errorf(\"encountered unknown attribute %v: %v\", raw.Name, raw.Value)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "527ff1d63ea907a4be3e1d2a39401087", "score": "0.50678885", "text": "func (c *ReadLinkPolicySettingsRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "2ba43cf8118e15d506bb75c343ec1eb3", "score": "0.5065502", "text": "func (c *ReadHoldModeActivityRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "315071cf6291d6eadcf0316195e396b3", "score": "0.5047076", "text": "func (s *Struct) Parse(bytes []byte, endianess binary.ByteOrder) (string, error) {\n\tstr := \"{\"\n\tfor _, val := range s.attributes {\n\t\tstart := val.Offset\n\t\tend := val.Offset + val.base.Size()\n\t\tattributeData := bytes[start:end]\n\t\tout, err := val.base.Parse(attributeData, endianess)\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tstr = fmt.Sprintf(\"%s %s: %s\", str, val.FieldName, out)\n\t}\n\tstr = fmt.Sprintf(\"%s }\", str)\n\treturn str, nil\n}", "title": "" }, { "docid": "e89d2f97a7333b0f76fea6f92e8ebff5", "score": "0.5014145", "text": "func (c *LEReadChannelMapRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "e89d2f97a7333b0f76fea6f92e8ebff5", "score": "0.5014145", "text": "func (c *LEReadChannelMapRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "9a602146745c4d0a7acc95c87ceeb3e3", "score": "0.5003279", "text": "func (c *ReadClassOfDeviceRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "56d79bd3f85636241d3ec6fb34a2357f", "score": "0.49968988", "text": "func (c *ReadVoiceSettingRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "4c981b2af0a2da492393c7565a1b10ad", "score": "0.498693", "text": "func (c *ReadStoredLinkKeyRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "da8744258256435cdd48c0d793a71632", "score": "0.49803606", "text": "func (s *Serializer) Deserialize(namespace, name string, metadata *lb.StateMetadata, structure interface{}, state ReadableState) error {\n\tvalue, _, err := s.SerializableChecks(structure)\n\tif err != nil {\n\t\treturn errors.WithMessagef(err, \"could not deserialize namespace %s/%s to unserializable type %T\", namespace, name, structure)\n\t}\n\n\ttypeName := value.Type().Name()\n\tif typeName != metadata.Datatype {\n\t\treturn errors.Errorf(\"type name mismatch '%s' != '%s'\", typeName, metadata.Datatype)\n\t}\n\n\tfor i := 0; i < value.NumField(); i++ {\n\t\tfieldName := value.Type().Field(i).Name\n\t\tfieldValue := value.Field(i)\n\t\tswitch fieldValue.Kind() {\n\t\tcase reflect.String:\n\t\t\toneOf, err := s.DeserializeFieldAsString(namespace, name, fieldName, state)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfieldValue.SetString(oneOf)\n\t\tcase reflect.Int64:\n\t\t\toneOf, err := s.DeserializeFieldAsInt64(namespace, name, fieldName, state)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfieldValue.SetInt(oneOf)\n\t\tcase reflect.Slice:\n\t\t\toneOf, err := s.DeserializeFieldAsBytes(namespace, name, fieldName, state)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tif oneOf != nil {\n\t\t\t\tfieldValue.SetBytes(oneOf)\n\t\t\t}\n\t\tcase reflect.Ptr:\n\t\t\t// Note, even non-existent keys will decode to an empty proto\n\t\t\tmsg := reflect.New(fieldValue.Type().Elem())\n\t\t\terr := s.DeserializeFieldAsProto(namespace, name, fieldName, state, msg.Interface().(proto.Message))\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfieldValue.Set(msg)\n\t\t\t// Note, other field kinds and bad types have already been checked by SerializableChecks\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "e9f13612c4502190d140ed7b7f9f478a", "score": "0.4974361", "text": "func (m *Message) Deserialize(r io.Reader) error {\r\n\tt, err := wire.ReadVarInt(r, wire.ProtocolVersion)\r\n\tif err != nil {\r\n\t\treturn errors.Wrap(err, \"type\")\r\n\t}\r\n\r\n\tm.Payload = PayloadForType(t)\r\n\tif m.Payload == nil {\r\n\t\treturn errors.Wrapf(ErrUnknownMessageType, \"%d\", t)\r\n\t}\r\n\r\n\tif err := m.Payload.Deserialize(r); err != nil {\r\n\t\treturn errors.Wrap(err, \"payload\")\r\n\t}\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "d2ef2f9be873f0d822abf3015fd2fd74", "score": "0.49646458", "text": "func (e *ExtendedAttribute) UnmarshalFrom(buf *Buffer) (err error) {\n\t*e = ExtendedAttribute{\n\t\tType: buf.ConsumeString(),\n\t\tData: buf.ConsumeString(),\n\t}\n\n\treturn buf.Err\n}", "title": "" }, { "docid": "19555ef094e3a5a602573d7e7a973cd1", "score": "0.49473798", "text": "func (a *elfAttributeList) armAttr() elfAttribute {\n\tattr := elfAttribute{tag: a.uleb128()}\n\tswitch {\n\tcase attr.tag == TagCompatibility:\n\t\tattr.ival = a.uleb128()\n\t\tattr.sval = a.string()\n\n\tcase attr.tag == TagNoDefaults: // Tag_nodefaults has no argument\n\n\tcase attr.tag == TagAlsoCompatibleWith:\n\t\t// Not really, but we don't actually care about this tag.\n\t\tattr.sval = a.string()\n\n\t// Tag with string argument\n\tcase attr.tag == TagCPUName || attr.tag == TagCPURawName || (attr.tag >= 32 && attr.tag&1 != 0):\n\t\tattr.sval = a.string()\n\n\tdefault: // Tag with integer argument\n\t\tattr.ival = a.uleb128()\n\t}\n\treturn attr\n}", "title": "" }, { "docid": "a62e72a787610d1556ab849f65acb835", "score": "0.4938988", "text": "func (rd *rdParser) attr(name string) (*Attr, error) {\n\ta := &Attr{Name: name}\n\ti := rd.next()\n\tif i.typ != TYPEID {\n\t\trd.error(\"syntax error\")\n\t\treturn nil, fmt.Errorf(\"Attribute definitions expect type after colon; got %s\", typDebug(i))\n\t}\n\ta.Type = i.val\n\tvar err error\n\tif a.Init, err = rd.maybeAssign(); err != nil {\n\t\treturn nil, err\n\t}\n\ti = rd.next()\n\tif i.typ != ';' {\n\t\trd.error(\"syntax error\")\n\t\treturn nil, fmt.Errorf(\"Attribute definitions end with semicolon; got %s\", typDebug(i))\n\t}\n\ta.Line = rd.line()\n\treturn a, nil\n}", "title": "" }, { "docid": "eb5594a80ee8e4a178c861c78f5c54e9", "score": "0.49285546", "text": "func (c *ResetRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "eb5594a80ee8e4a178c861c78f5c54e9", "score": "0.49285546", "text": "func (c *ResetRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "bcb3f987b80e6734d7b3072aaef8fb25", "score": "0.4928492", "text": "func Unmarshal(b []byte) (ret *V, err error) {\n\tif nil == b || 0 == len(b) {\n\t\treturn nil, ErrNilParameter\n\t}\n\n\tfor i, c := range b {\n\t\tswitch c {\n\t\tcase ' ', '\\r', '\\n', '\\t', '\\b':\n\t\t\t// continue\n\t\tcase '{':\n\t\t\t// object start\n\t\t\treturn newFromObject(b[i:])\n\t\tcase '[':\n\t\t\treturn newFromArray(b[i:])\n\t\tcase '0', '1', '2', '3', '4', '5', '6', '7', '8', '9', '-':\n\t\t\tret, err = newFromNumber(b[i:])\n\t\t\tif err != nil {\n\t\t\t\treturn\n\t\t\t}\n\t\t\terr = ret.parseNumber()\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\treturn ret, nil\n\n\t\tcase '\"':\n\t\t\tret = new()\n\t\t\tret.valueType = jsonparser.String\n\t\t\tret.value.str, ret.valueBytes, err = parseString(b[i:])\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tret.status.parsed = true\n\t\t\treturn ret, nil\n\n\t\tcase 't':\n\t\t\treturn newFromTrue(b[i:])\n\t\tcase 'f':\n\t\t\treturn newFromFalse(b[i:])\n\t\tcase 'n':\n\t\t\treturn newFromNull(b[i:])\n\t\tdefault:\n\t\t\treturn nil, ErrRawBytesUnrecignized\n\t\t}\n\t}\n\n\treturn nil, ErrRawBytesUnrecignized\n}", "title": "" }, { "docid": "55e29561ac55a216d5b99089604ef001", "score": "0.49218547", "text": "func (m *NfNlMessage) parse(r *bytes.Reader, hdr syscall.NlMsghdr) error {\n\tm.NlMsghdr = hdr\n\tif err := binary.Read(r, binary.BigEndian, &m.NfGenHdr); err != nil {\n\t\treturn err\n\t}\n\treturn m.parseAttributes(r)\n}", "title": "" }, { "docid": "e3133a449248ab7b62fb713d55e8ecc6", "score": "0.491911", "text": "func (c *ReadLocalNameRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "7b9e487e4c8785bef85047c9eb601ec3", "score": "0.49176583", "text": "func (m *TorrentMeta) Deserialize(b []byte) error {\n\tmi, err := core.DeserializeMetaInfo(b)\n\tif err != nil {\n\t\treturn err\n\t}\n\tm.MetaInfo = mi\n\treturn nil\n}", "title": "" }, { "docid": "b91cbee574410164a01141add652f83d", "score": "0.49069342", "text": "func (c *Condition) deserialize(source string) error {\n\t// No value zero the address.\n\tif len(source) == 0 {\n\t\t*c = nil\n\t\treturn nil\n\t}\n\n\targs := strings.Split(source, \"/\")\n\tif len(args) != 3 {\n\t\treturn errors.Wrap(errors.ErrInput, \"invalid condition format\")\n\t}\n\tdata, err := hex.DecodeString(args[2])\n\tif err != nil {\n\t\treturn errors.Wrapf(errors.ErrInput, \"malformed condition data: %s\", err)\n\t}\n\t*c = NewCondition(args[0], args[1], data)\n\treturn nil\n}", "title": "" }, { "docid": "46b15678e184d4fcc76a8c037684b53a", "score": "0.4882743", "text": "func (k *NodeMapKey) Unmarshal(s string) (bool, error) {\n\n\tprefix := \"RF\"\n\n\tok := strings.HasPrefix(s, prefix)\n\tif !ok {\n\t\treturn false, errors.New(\"RF NodeMapping must begin 'RF'...\" + s)\n\t}\n\n\trdr := strings.NewReader(s[len(prefix):])\n\n\ttoken := \"\"\n\tband := \"\"\n\tgroup := \"\"\n\tnode := \"\"\n\n\tvar err error\n\n\tfor err == nil {\n\t\tvar c byte\n\t\tc, err = rdr.ReadByte()\n\n\t\tswitch string(c) {\n\t\tcase \"b\", \"g\", \"i\":\n\t\t\ttoken = string(c)\n\t\t\tcontinue\n\t\tcase \"0\", \"1\", \"2\", \"3\", \"4\", \"5\", \"6\", \"7\", \"8\", \"9\":\n\t\t\tif token == \"b\" {\n\t\t\t\tband += string(c)\n\t\t\t} else if token == \"g\" {\n\t\t\t\tgroup += string(c)\n\t\t\t} else {\n\t\t\t\tnode += string(c)\n\t\t\t}\n\t\t\tcontinue\n\t\t}\n\n\t}\n\n\tif band != \"\" {\n\t\tif k.band, err = strconv.Atoi(band); err != nil {\n\t\t\treturn false, err\n\t\t}\n\t}\n\n\tif group != \"\" {\n\t\tif k.group, err = strconv.Atoi(group); err != nil {\n\t\t\treturn false, err\n\t\t}\n\t}\n\n\tif node != \"\" {\n\t\tif k.node, err = strconv.Atoi(node); err != nil {\n\t\t\treturn false, err\n\t\t}\n\t}\n\n\treturn true, nil\n\n}", "title": "" }, { "docid": "25c826207ef00948a67cd9e913af10ac", "score": "0.48798156", "text": "func (c *LEReceiverTestRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "25c826207ef00948a67cd9e913af10ac", "score": "0.48798156", "text": "func (c *LEReceiverTestRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "1191c4ea46e8889581918319ca6b69fe", "score": "0.48733073", "text": "func (c *ReadLocalVersionInformationRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "1191c4ea46e8889581918319ca6b69fe", "score": "0.48733073", "text": "func (c *ReadLocalVersionInformationRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "c02e976fad94675631e71445b5f665b8", "score": "0.4863622", "text": "func (e *Entry) fromRawMovieAttribute(raw rawAttribute) error {\n\tmovie, ok := e.Content.(*Movie)\n\tif !ok && e.Content != nil {\n\t\treturn errors.Errorf(\"encountered Movie specific attribute but Content implementation is not set to Movie\")\n\t} else if !ok {\n\t\te.Content = new(Movie)\n\t\tmovie = e.Content.(*Movie)\n\t}\n\n\tswitch raw.Name {\n\tcase \"imdb\":\n\t\tparsedInt, err := strconv.ParseInt(raw.Value, 10, 64)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing IMDB ID: %v\", 1, raw.Value)\n\t\t}\n\t\tmovie.IMDBID = parsedInt\n\tcase \"imdbtitle\":\n\t\tmovie.IMDBTitle = raw.Value\n\tcase \"imdbyear\":\n\t\tparsedUint, err := strconv.ParseUint(raw.Value, 10, 64)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing IMDB year: %v\", 1, raw.Value)\n\t\t}\n\t\tt := time.Date(int(parsedUint), time.January, 1, 0, 0, 0, 0, time.UTC)\n\t\tmovie.IMDBYear = t\n\tcase \"imdbscore\":\n\t\tparsedFloat, err := strconv.ParseFloat(raw.Value, 64)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing IMDB score: %v\", 1, raw.Value)\n\t\t}\n\t\tmovie.IMDBScore = parsedFloat\n\tcase \"coverurl\":\n\t\tu, err := url.Parse(raw.Value)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing cover URL: %v\", 1, raw.Value)\n\t\t}\n\t\tmovie.Cover = u\n\tdefault:\n\t\treturn errors.Errorf(\"encountered unknown attribute %v: %v\", raw.Name, raw.Value)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "33e45b148da92280ed007f99f6117797", "score": "0.4862583", "text": "func (c *ReadBufferSizeRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "33e45b148da92280ed007f99f6117797", "score": "0.4862583", "text": "func (c *ReadBufferSizeRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "95eb4f7b0252e12c3c67e123b62c6caf", "score": "0.48620823", "text": "func (c *ReadTransmitPowerLevelRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "95eb4f7b0252e12c3c67e123b62c6caf", "score": "0.48620823", "text": "func (c *ReadTransmitPowerLevelRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "8612ac68b539e0870e9259b3798010e9", "score": "0.48558053", "text": "func parseAttributes(bfr io.ByteReader, char *Character) error {\n\t// Create a bit reader from the buffered reader to read the stats.\n\tbr := bitReader{r: bfr}\n\n\tfor {\n\t\tid, err := br.ReadBits(9)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// If all 9 bits are set, we've hit the end of the attributes section\n\t\t// at 0x1ff and exit the loop.\n\t\tif id == 0x1ff {\n\t\t\tbreak\n\t\t}\n\n\t\t// The attribute value bit length, so we'll know how many bits to read next.\n\t\tlength, ok := attributeBitMap[id]\n\t\tif !ok {\n\t\t\treturn fmt.Errorf(\"unknown attribute id: %d\", id)\n\t\t}\n\n\t\t// The attribute value.\n\t\tattr, err := br.ReadBits(length)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tswitch id {\n\t\tcase strength:\n\t\t\tchar.Attributes.Strength = attr\n\t\tcase energy:\n\t\t\tchar.Attributes.Energy = attr\n\t\tcase dexterity:\n\t\t\tchar.Attributes.Dexterity = attr\n\t\tcase vitality:\n\t\t\tchar.Attributes.Vitality = attr\n\t\tcase unusedStats:\n\t\t\tchar.Attributes.UnusedStats = attr\n\t\tcase unusedSkills:\n\t\t\tchar.Attributes.UnusedSkillPoints = attr\n\t\tcase currentHP:\n\t\t\tchar.Attributes.CurrentHP = attr / 256\n\t\tcase maxHP:\n\t\t\tchar.Attributes.MaxHP = attr / 256\n\t\tcase currentMana:\n\t\t\tchar.Attributes.CurrentMana = attr / 256\n\t\tcase maxMana:\n\t\t\tchar.Attributes.MaxMana = attr / 256\n\t\tcase currentStamina:\n\t\t\tchar.Attributes.CurrentStamina = attr / 256\n\t\tcase maxStamina:\n\t\t\tchar.Attributes.MaxStamina = attr / 256\n\t\tcase level:\n\t\t\tchar.Attributes.Level = attr\n\t\tcase experience:\n\t\t\tchar.Attributes.Experience = attr\n\t\tcase gold:\n\t\t\tchar.Attributes.Gold = attr\n\t\tcase stashedGold:\n\t\t\tchar.Attributes.StashedGold = attr\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "af2d1309f2aa7e04e815183352056989", "score": "0.4854032", "text": "func (c *LEReadBufferSizeRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "af2d1309f2aa7e04e815183352056989", "score": "0.4854032", "text": "func (c *LEReadBufferSizeRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "41a34869d67cf13309d72f5eb803db06", "score": "0.48521137", "text": "func deserialize(l []byte) (runtime.Object, error) {\n\tdes := scheme.Codecs.UniversalDeserializer()\n\tobj, _, err := des.Decode(l, nil, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn obj, nil\n}", "title": "" }, { "docid": "e9f7707967c7e089eaa349b1dda3810a", "score": "0.48510677", "text": "func (c *ReadAuthenticationEnableRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "d959c312e897589691d4f4863b3eb94a", "score": "0.48303598", "text": "func (e *Entry) fromRawFileAttribute(raw rawAttribute) error {\n\tswitch {\n\tcase strings.Contains(\"size,seeders,peers,infohash\", raw.Name):\n\t\treturn e.fromRawTorrentAttribute(raw)\n\t/* case strings.Contains(\"\", raw.Name):\n\treturn e.fromRawNZBAttribute(raw) */\n\tdefault:\n\t\treturn errors.Errorf(\"encountered unknown attribute %v: %v\", raw.Name, raw.Value)\n\t}\n}", "title": "" }, { "docid": "307511c1b659cf29c9fcf662214d930d", "score": "0.4826698", "text": "func (msg *WireMsg) Parse(line string) {\n\tif strings.Index(line, \"=\") < 0 {\n\t\tmsg.HasValue = false\n\t\tmsg.SetKey(line)\n\t} else {\n\t\tparts := strings.SplitN(line, \"=\", 2)\n\t\tmsg.SetKey(parts[0])\n\t\tmsg.HasValue = true\n\t\tmsg.Value = parts[1]\n\t}\n\t// relink using the lexicon\n\tmsg.relinkKey()\n}", "title": "" }, { "docid": "64625ff6ce0400ef6a5532f0d202be25", "score": "0.4816468", "text": "func (c *ReadBDADDRRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "64625ff6ce0400ef6a5532f0d202be25", "score": "0.4816468", "text": "func (c *ReadBDADDRRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "19b8754063900030249e47c9743a86fe", "score": "0.48099595", "text": "func (e *Entry) fromRawMetaAttribute(raw rawAttribute) (err error) {\n\tswitch raw.Name {\n\tcase \"guid\":\n\t\te.Meta.ID, err = uuid.FromString(raw.Value)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing rawEntry's ID: %s\", 1, raw.Value)\n\t\t}\n\tcase \"grabs\":\n\t\tparsedUint, err := strconv.ParseUint(raw.Value, 10, 64)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing number of grabs: %v\", 1, raw.Value)\n\t\t}\n\t\te.Meta.Grabs = parsedUint\n\tcase \"comments\":\n\t\tparsedUint, err := strconv.ParseUint(raw.Value, 10, 64)\n\t\tif err != nil {\n\t\t\treturn errors.Wrapf(err, \"error parsing number of comments: %v\", 1, raw.Value)\n\t\t}\n\t\te.Meta.Comments.Number = parsedUint\n\tcase \"usenetdate\":\n\t\tif parsedUsetnetDate, err := parseDate(raw.Value); err != nil {\n\t\t\treturn errors.Wrapf(err, \"failed to parse usenet date: %v\", 1, raw.Value)\n\t\t} else {\n\t\t\te.Meta.Dates.Usenet = parsedUsetnetDate\n\t\t}\n\tdefault:\n\t\treturn errors.Errorf(\"encountered unknown attribute %v: %v\", raw.Name, raw.Value)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "eaed46e44255c12601a09a482bcd2b2f", "score": "0.48054287", "text": "func (at *AttributeType) Unmarshal(data []byte) error {\n\t*at = AttributeType(data[0])\n\treturn nil\n}", "title": "" }, { "docid": "2abc531a17012df5199b33f81a0f4158", "score": "0.48027083", "text": "func (id *ID) Deserialize(r io.Reader) error {\n\t_, err := io.ReadFull(r, id.bytes[:])\n\treturn err\n}", "title": "" }, { "docid": "f33cd0cdf19fca59544a7acfaa9b6334", "score": "0.48003605", "text": "func (c *ReadInquiryScanActivityRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "77b0dd87ddbfedb858075355b46e90ca", "score": "0.47832027", "text": "func (n *RegistryNotification) ParseFrom(b []byte) error {\n if len(b) < MinRegistryNotificationSize {\n return ErrParsingFailed\n }\n n.NotificationHeader.ParseFrom(b)\n n.RegistryAction = binary.LittleEndian.Uint16(b[24:26])\n n.Truncated = binary.LittleEndian.Uint16(b[26:28])\n n.ValueName = decodeUnicodeByteBuffer(b[28:156])\n n.KeyPath = decodeUnicodeByteBuffer(b[156:])\n return nil\n}", "title": "" }, { "docid": "369cb21425d026d8656c370596823738", "score": "0.47808182", "text": "func (t *TypeDef) Parse(bytes []byte, endianess binary.ByteOrder) (string, error) {\n\treturn t.Base.Parse(bytes, endianess)\n}", "title": "" }, { "docid": "b21a8c6983c1d5093f1536ca2dd9392d", "score": "0.47691685", "text": "func (c *DeleteStoredLinkKeyRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "88951ddd9ae07ad3527956334d9051bc", "score": "0.4763425", "text": "func (c *LEEncryptRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "88951ddd9ae07ad3527956334d9051bc", "score": "0.4763425", "text": "func (c *LEEncryptRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "c7eba9806a11f1602e4dcd3c0da90711", "score": "0.47630522", "text": "func (c *ReadNumBroadcastRetransmissionsRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "245533a72c02e8c7010a202c3a9411b7", "score": "0.47607777", "text": "func UnmarshalBaseTargetAttribute(m map[string]json.RawMessage, result interface{}) (err error) {\n\tobj := new(BaseTargetAttribute)\n\terr = core.UnmarshalPrimitive(m, \"name\", &obj.Name)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = core.UnmarshalPrimitive(m, \"value\", &obj.Value)\n\tif err != nil {\n\t\treturn\n\t}\n\treflect.ValueOf(result).Elem().Set(reflect.ValueOf(obj))\n\treturn\n}", "title": "" }, { "docid": "e7dc626b514eaa4deebcdb0bb822272c", "score": "0.47607294", "text": "func (entity *Radio) Unmarshal(raw []byte) error {\n\treturn json.Unmarshal(raw, entity)\n}", "title": "" }, { "docid": "c6ecc3dce8dd7a5716aa4535e0193cc4", "score": "0.47606513", "text": "func (rfv RealFieldValue) Parse() (parsed interface{}, err error) {\n\tf, err := strconv.ParseFloat(rfv.raw, 64)\n\tif err != nil {\n\t\treturn nil, ErrValueNotValid\n\t}\n\n\treturn f, nil\n}", "title": "" }, { "docid": "a15f9589d7f92218d1439a7c69294671", "score": "0.4755747", "text": "func (c *LETransmitterTestRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "a15f9589d7f92218d1439a7c69294671", "score": "0.4755747", "text": "func (c *LETransmitterTestRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "3ccd6f6e3f19c1087fb9dfa0df244537", "score": "0.47496793", "text": "func (c *ReadScanEnableRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "e6a9883f45a49ea3a048497d8a97b2e9", "score": "0.47389957", "text": "func (c *ReadAutomaticFlushTimeoutRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "fd7dd5981d7bf614d92af7df26ccd962", "score": "0.4736668", "text": "func (c *LESetScanParametersRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "fd7dd5981d7bf614d92af7df26ccd962", "score": "0.4736668", "text": "func (c *LESetScanParametersRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "3688d822ebabede7ddfdcad2643c6015", "score": "0.47352782", "text": "func (c *WriteAuthenticatedPayloadTimeoutRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "3688d822ebabede7ddfdcad2643c6015", "score": "0.47352782", "text": "func (c *WriteAuthenticatedPayloadTimeoutRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "44547142f5dc6bba2455f5a3a5cd7015", "score": "0.47269216", "text": "func (c *LERemoteConnectionParameterRequestReplyRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "44547142f5dc6bba2455f5a3a5cd7015", "score": "0.47269216", "text": "func (c *LERemoteConnectionParameterRequestReplyRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "482988ff9ca9eb70252b5a8a87649c79", "score": "0.47267666", "text": "func (c *LinkKeyRequestReplyRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "32068302d97fed9c71d4fd1549ea507f", "score": "0.47266665", "text": "func (c *LESetScanResponseDataRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "32068302d97fed9c71d4fd1549ea507f", "score": "0.47266665", "text": "func (c *LESetScanResponseDataRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "5af08b9cdb6469009dfb60de1fae4e9d", "score": "0.4726261", "text": "func (c *LEReadWhiteListSizeRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "5af08b9cdb6469009dfb60de1fae4e9d", "score": "0.4726261", "text": "func (c *LEReadWhiteListSizeRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "c79ccd1b046070d9f5373100668619f4", "score": "0.47260562", "text": "func (c *ReadPageTimeoutRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "59d1d3fa45098390c4feec861c070635", "score": "0.47189784", "text": "func (s Serializer) Deserialize(r io.Reader) (interface{}, error) {\n\tname, payload, err := s.encoder.Decode(r)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tt, ok := s.typeMap[name]\n\tif !ok {\n\t\treturn nil, UnknownTypeError{name}\n\t}\n\n\tisPtr := false\n\tif t.Kind() == reflect.Ptr {\n\t\tt = t.Elem()\n\t\tisPtr = true\n\t}\n\n\ti := reflect.New(t).Interface()\n\n\tif err := s.encoder.Unmarshal(payload, i); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !isPtr {\n\t\ti = reflect.ValueOf(i).Elem().Interface()\n\t}\n\n\treturn i, nil\n}", "title": "" }, { "docid": "199ee1ff24256dcc197b5b1a6bbc1e2b", "score": "0.47065362", "text": "func (e *Entry) fromRawAttribute(raw rawAttribute) (err error) {\n\tswitch {\n\tcase strings.Contains(\"category,genre,info\", raw.Name):\n\t\treturn e.fromRawGeneralAttribute(raw)\n\tcase strings.Contains(\"guid,comments,grabs,usenetdate\", raw.Name):\n\t\treturn e.fromRawMetaAttribute(raw)\n\tcase strings.Contains(\"rating,tvtitle,episode,season,rageid,tvdbid,tvairdate,imdb,imdbtitle,imdbyear,imdbscore,coverurl\", raw.Name):\n\t\treturn e.fromRawContentAttribute(raw)\n\tcase strings.Contains(\"size,seeders,peers,infohash\", raw.Name):\n\t\treturn e.fromRawFileAttribute(raw)\n\tdefault:\n\t\t// return errors.Errorf(\"encountered unknown attribute %v: %v\", raw.Name, raw.Value)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8b94a9f18460d6e27c53402221d5657b", "score": "0.46945217", "text": "func (c *ReadConnectionAcceptTimeoutRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "580eb1e28aaf5db9e6c0a59a3479ca87", "score": "0.46915305", "text": "func (r *Rack) parse() error {\n\tr.Val = cleanWs(r.Val)\n\tpos := make([]int, 0)\n\tfor i := range r.Val {\n\t\tif r.Val[i] == ' ' {\n\t\t\tpos = append(pos, i)\n\t\t}\n\t}\n\tif len(pos) != 2 {\n\t\treturn errors.New(\"Rack.parse err: could not locate two LWS.\")\n\t}\n\tr.RseqVal = r.Val[0:pos[0]]\n\tr.CseqVal = r.Val[pos[0]+1 : pos[1]]\n\tif len(r.Val)-1 > pos[1] {\n\t\tr.CseqMethod = r.Val[pos[1]+1:]\n\t\treturn nil\n\t}\n\treturn errors.New(\"Rack.parse err: value of RAck ends in LWS.\")\n}", "title": "" }, { "docid": "2cc861a3473135453c744d9613b91585", "score": "0.46887755", "text": "func (c *ReadPageScanActivityRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "0035cb4640ad1ab8ef1e4770c0bfd8ce", "score": "0.4685605", "text": "func (c *LESetRandomAddressRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "0035cb4640ad1ab8ef1e4770c0bfd8ce", "score": "0.4685605", "text": "func (c *LESetRandomAddressRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "cc570b36f72e2ff11efcb84dd846becd", "score": "0.46848756", "text": "func (c *HostBufferSizeRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "cc570b36f72e2ff11efcb84dd846becd", "score": "0.46848756", "text": "func (c *HostBufferSizeRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "11ab9f9c757b870713681f6f72f5537d", "score": "0.46802223", "text": "func (c *LESetAdvertisingParametersRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "11ab9f9c757b870713681f6f72f5537d", "score": "0.46802223", "text": "func (c *LESetAdvertisingParametersRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "ff6788c6137e34b4c71eeeab10ad8430", "score": "0.46708184", "text": "func (m *Ping) Deserialize(r io.Reader) error {\r\n\tt, err := wire.ReadVarInt(r, wire.ProtocolVersion)\r\n\tif err != nil {\r\n\t\treturn errors.Wrap(err, \"timestamp\")\r\n\t}\r\n\tm.TimeStamp = t\r\n\r\n\treturn nil\r\n}", "title": "" }, { "docid": "c07d79e80ac6bf3067c941880e81d1c0", "score": "0.4668898", "text": "func (c *LESetHostChannelClassificationRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "c07d79e80ac6bf3067c941880e81d1c0", "score": "0.4668898", "text": "func (c *LESetHostChannelClassificationRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "84508530772b18531b3503766d927526", "score": "0.46581218", "text": "func Parse(r io.Reader, v interface{}) error {\n\tbr := bufio.NewReader(r)\n\tdec := json.NewDecoder(br)\n\treturn dec.Decode(v)\n}", "title": "" }, { "docid": "8b4b51a645856a5555b56cf6012c0381", "score": "0.4652988", "text": "func (m *UnsubscribeHeaders) Deserialize(r io.Reader) error {\r\n\treturn nil\r\n}", "title": "" }, { "docid": "34483cc0101341b46f1375db368e3f06", "score": "0.46501908", "text": "func ParseManifest(r io.Reader) (ManifestInfo, error) {\n\treturn parseManifest(r)\n}", "title": "" }, { "docid": "6c7647d57262eec4d8a30825257c2a3d", "score": "0.46497935", "text": "func (c *LESetAdvertisingDataRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "6c7647d57262eec4d8a30825257c2a3d", "score": "0.46497935", "text": "func (c *LESetAdvertisingDataRP) Unmarshal(b []byte) error {\n\treturn unmarshal(c, b)\n}", "title": "" }, { "docid": "8b742a9d3f95c72d1a0c492b9bd52115", "score": "0.46483433", "text": "func (trfm *tssRoundFourMessage) Unmarshal(bytes []byte) error {\n\tpbMsg := pb.TSSRoundFourMessage{}\n\tif err := proto.Unmarshal(bytes, &pbMsg); err != nil {\n\t\treturn err\n\t}\n\n\tif err := validateMemberIndex(pbMsg.SenderID); err != nil {\n\t\treturn err\n\t}\n\n\ttrfm.senderID = group.MemberIndex(pbMsg.SenderID)\n\ttrfm.broadcastPayload = pbMsg.BroadcastPayload\n\ttrfm.sessionID = pbMsg.SessionID\n\n\treturn nil\n}", "title": "" }, { "docid": "4638fe3d614410ca9b1db6634b603ca0", "score": "0.4633177", "text": "func (style *Style) UnmarshalAttribute(value string) error {\n *style = make(Style)\n styleList := strings.Split(value, \";\")\n for _, s := range styleList {\n pair := strings.Split(s, \":\")\n if len(pair) == 2 {\n (*style)[pair[0]] = strings.Trim(pair[1], \" \")\n }\n }\n return nil\n}", "title": "" } ]
5803547f8e8b8ebeebb63ff9f4239ae0
NewIntentCompilationService makes a new Intent Compilation Service.
[ { "docid": "050d9f51f27093f51e7c0dd168e2d543", "score": "0.77258223", "text": "func NewIntentCompilationService() (*IntentCompilationService, error) {\n\tc := config.ReadConfig()\n\n\tec, err := etcd.NewClientByViper(serviceName)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tapiClient := newAPIClient(&c.APIClientConfig)\n\n\tlogicService, err := SetupService(apiClient, apiClient, apiClient)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &IntentCompilationService{\n\t\tservice: logicService,\n\t\tapiClient: apiClient,\n\t\tStore: ec,\n\t\tconfig: &c,\n\t\tlog: logutil.NewLogger(serviceName),\n\t}, nil\n}", "title": "" } ]
[ { "docid": "d1b4f00c3f509d7ec8b171dd259c9e75", "score": "0.678782", "text": "func RunIntentCompilationService(t *testing.T, apiURL string) context.CancelFunc {\n\tsetViper(map[string]interface{}{\n\t\t\"compilation.plugin_directory\": pluginDirectory,\n\t\t\"compilation.number_of_workers\": 4,\n\t\t\"compilation.max_job_queue_len\": 5,\n\t\t\"compilation.msg_queue_lock_time\": 30,\n\t\t\"compilation.msg_index_string\": messageIndex,\n\t\t\"compilation.read_lock_string\": readLock,\n\t\t\"compilation.master_election\": true,\n\t\t\"compilation.plugin\": map[string]map[string]string{\n\t\t\t\"handlers\": {\n\t\t\t\t\"create_handler\": \"HandleCreate\",\n\t\t\t\t\"update_handler\": \"HandleUpdate\",\n\t\t\t\t\"delete_handler\": \"HandleDelete\",\n\t\t\t},\n\t\t},\n\t\tetcd.ETCDEndpointsVK: integrationetcd.Endpoint,\n\t\tetcd.ETCDGRPCInsecureVK: true,\n\t\tetcd.ETCDPathVK: integrationetcd.Prefix,\n\t\t\"client.id\": AdminUserID,\n\t\t\"client.password\": AdminUserPassword,\n\t\t\"client.project_id\": AdminProjectID,\n\t\t\"client.domain_id\": DefaultDomainID,\n\t\t\"client.schema_root\": \"/public\",\n\t\t\"client.endpoint\": apiURL,\n\t\t\"insecure\": true,\n\t})\n\n\tics, err := compilation.NewIntentCompilationService()\n\trequire.NoError(t, err, \"creating Intent Compilation service failed\")\n\n\tctx, cancel := context.WithCancel(context.Background())\n\n\terrChan := make(chan error)\n\tgo func() {\n\t\terrChan <- ics.Run(ctx)\n\t}()\n\n\treturn func() {\n\t\tcancel()\n\t\tassert.NoError(t, <-errChan, \"unexpected Intent Compilation runtime error\")\n\t}\n}", "title": "" }, { "docid": "b873304c359ac4b6581445b7ef41399c", "score": "0.575361", "text": "func newService(c *onet.Context) onet.Service {\n\t//fmt.Printf(\"!!!!! newService\\n\\n\")\n\ts := &Service{\n\t\tServiceProcessor: onet.NewServiceProcessor(c),\n\t\tskipchainClient: skipchain.NewClient(),\n\t\tcosiClient: cosisign.NewClient(),\n\t\tStorage: &Storage{\n\t\t\tGenesisPolicy: skipchain.NewSkipBlock(),\n\t\t\tLatestPolicy: skipchain.NewSkipBlock(),\n\t\t},\n\t}\n\tif err := s.RegisterHandlers(s.GenesisPolicyRequest, s.NewPolicyRequest, s.GetPolicyRequest, s.VerifyPolicyRequest); err != nil {\n\t\tlog.ErrFatal(err, \"Couldn't register messages\")\n\t}\n\tif err := s.tryLoad(); err != nil {\n\t\tlog.Error(err)\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "963a88c979fa13481475ad2ae2c22323", "score": "0.5711475", "text": "func (sMgr *ServiceMgr) createNewServiceIntent(serviceIntent *ServiceIntent) {\n\tvar topologyObject = sMgr.master.getTopologyByName(serviceIntent.TopologyName)\n\tif topologyObject == nil {\n\t\tERROR.Println(\"failed to find the associated topology\")\n\t\treturn\n\t}\n\n\tserviceIntent.TopologyObject = topologyObject\n\n\tlistTaskIntent := make([]*TaskIntent, 0)\n\n\tfor _, task := range serviceIntent.TopologyObject.Tasks {\n\t\t// to handle the task intent directly\n\t\ttaskIntent := TaskIntent{}\n\n\t\t// new random uid\n\t\tu1, _ := uuid.NewUUID()\n\t\trid := u1.String()\n\t\ttaskIntent.ID = rid\n\n\t\ttaskIntent.GeoScope = serviceIntent.GeoScope\n\t\ttaskIntent.Priority = serviceIntent.Priority\n\t\t//taskIntent.SType = serviceIntent.SType\n\t\ttaskIntent.QoS = serviceIntent.QoS\n\t\ttaskIntent.TopologyName = serviceIntent.TopologyName\n\t\ttaskIntent.TaskObject = task\n\t\ttaskIntent.ServiceIntentID = serviceIntent.ID\n\n\t\tsMgr.master.taskMgr.handleTaskIntent(&taskIntent)\n\n\t\tlistTaskIntent = append(listTaskIntent, &taskIntent)\n\t}\n\n\tsMgr.intentList_lock.Lock()\n\tdefer sMgr.intentList_lock.Unlock()\n\n\t// to record the task intents for this high level service intent\n\tsMgr.service2TaskMap[serviceIntent.ID] = listTaskIntent\n\t// record the service intent\n\tsMgr.serviceIntentMap[serviceIntent.ID] = serviceIntent\n}", "title": "" }, { "docid": "e9a3ac0b922085a96989ca417ca45e8f", "score": "0.5706758", "text": "func newService(c *onet.Context) onet.Service {\n\ts := &Service{\n\t\tServiceProcessor: onet.NewServiceProcessor(c),\n\t\tdata: &saveData{},\n\t\tccChannel: make(chan *CheckConfigReply, 1),\n\t}\n\tif err := s.RegisterHandlers(s.PinRequest, s.StoreConfig, s.FinalizeRequest); err != nil {\n\t\tlog.ErrFatal(err, \"Couldn't register messages\")\n\t}\n\tif err := s.tryLoad(); err != nil {\n\t\tlog.Error(err)\n\t}\n\ts.RegisterProcessorFunc(checkConfigID, s.CheckConfig)\n\ts.RegisterProcessorFunc(checkConfigReplyID, s.CheckConfigReply)\n\treturn s\n}", "title": "" }, { "docid": "7b6d5b495e8b2cbb7d944463de208b86", "score": "0.5526916", "text": "func NewService() Service {\n return &service{}\n}", "title": "" }, { "docid": "bd02ca7df84ba8ab03a0c7d96f5745df", "score": "0.54574406", "text": "func newInstrumentedRuntimeService(service internalapi.RuntimeService) internalapi.RuntimeService {\n\treturn &instrumentedRuntimeService{service: service}\n}", "title": "" }, { "docid": "b405ac3a1996a003c71e17bf811c2e4d", "score": "0.5296415", "text": "func newServiceForCR(cr *brokerv1alpha1.ActiveMQArtemis, name_suffix string, port_number int32) *corev1.Service {\n\n\t// Log where we are and what we're doing\n\t//reqLogger := log.WithValues(\"ActiveMQArtemis Name\", cr.Name)\n\t//reqLogger.Info(\"Creating new \" + name_suffix + \" service\")\n\n\tlabels := selectors.LabelsForActiveMQArtemis(cr.Name)\n\n\tport := corev1.ServicePort{\n\t\tName: cr.Name + \"-\" + name_suffix + \"-port\",\n\t\tProtocol: \"TCP\",\n\t\tPort: port_number,\n\t\tTargetPort: intstr.FromInt(int(port_number)),\n\t}\n\tports := []corev1.ServicePort{}\n\tports = append(ports, port)\n\n\tsvc := &corev1.Service{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"Service\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tAnnotations: nil,\n\t\t\tLabels: labels,\n\t\t\tName: cr.Name + \"-\" + name_suffix + \"-service\",\n\t\t\tNamespace: cr.Namespace,\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tType: \"LoadBalancer\",\n\t\t\tPorts: ports,\n\t\t\tSelector: labels,\n\t\t\tSessionAffinity: \"ClientIP\",\n\t\t},\n\t}\n\n\treturn svc\n}", "title": "" }, { "docid": "eb85bfcdb94518100417987b84e6b550", "score": "0.5288157", "text": "func New(m Module) *Service {\n\tsvc := NewApp(m)\n\tsvc.commands[\"start\"] = &Command{\n\t\tKeyword: \"start\",\n\t\tRun: func(*CommandContext) { svc.start() },\n\t\tShortUsage: \"Start the app\",\n\t\tUsage: \"Start running the app\",\n\t}\n\treturn svc\n}", "title": "" }, { "docid": "c5c443e44c986cf18bf59d3f4334d52b", "score": "0.52575004", "text": "func newService(mattermost *mattermostv1alpha1.ClusterInstallation, serviceName, selectorName string, annotations map[string]string) *corev1.Service {\n\treturn &corev1.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tLabels: mattermost.ClusterInstallationLabels(serviceName),\n\t\t\tName: serviceName,\n\t\t\tNamespace: mattermost.Namespace,\n\t\t\tOwnerReferences: []metav1.OwnerReference{\n\t\t\t\t*metav1.NewControllerRef(mattermost, schema.GroupVersionKind{\n\t\t\t\t\tGroup: mattermostv1alpha1.GroupVersion.Group,\n\t\t\t\t\tVersion: mattermostv1alpha1.GroupVersion.Version,\n\t\t\t\t\tKind: \"ClusterInstallation\",\n\t\t\t\t}),\n\t\t\t},\n\t\t\tAnnotations: annotations,\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tSelector: mattermostv1alpha1.ClusterInstallationSelectorLabels(selectorName),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "939a6d5e0cb44d26f24a5cafc49aaf67", "score": "0.5234542", "text": "func NewService(\n\torm ORM,\n\ttxm postgres.TransactionManager,\n\tjobSpawner job.Spawner,\n\tcsaKeyStore keystore.CSAKeystoreInterface,\n\tethKeyStore keystore.EthKeyStoreInterface,\n\tcfg Config,\n) *service {\n\tctx, cancel := context.WithCancel(context.Background())\n\tsvc := &service{\n\t\tchDone: make(chan struct{}),\n\t\tconnCtx: ctx,\n\t\tconnCtxCancel: cancel,\n\t\torm: orm,\n\t\ttxm: txm,\n\t\tjobSpawner: jobSpawner,\n\t\tcsaKeyStore: csaKeyStore,\n\t\tethKeyStore: ethKeyStore,\n\t\tcfg: cfg,\n\t}\n\n\treturn svc\n}", "title": "" }, { "docid": "0afdd1a5685462bff0b750398ef8cf95", "score": "0.5229608", "text": "func (g *chassis) generateService(file *generator.FileDescriptor, service *pb.ServiceDescriptorProto, index int) {\n\tpath := fmt.Sprintf(\"6,%d\", index) // 6 means service.\n\n\torigServName := service.GetName()\n\tserviceName := strings.ToLower(service.GetName())\n\tif pkg := file.GetPackage(); pkg != \"\" {\n\t\tserviceName = pkg\n\t}\n\tservName := generator.CamelCase(origServName)\n\tservAlias := servName + \"Service\"\n\n\t// strip suffix\n\tif strings.HasSuffix(servAlias, \"ServiceService\") {\n\t\tservAlias = strings.TrimSuffix(servAlias, \"Service\")\n\t}\n\n\t// Client interface.\n\tg.P(\"type \", servAlias, \" interface {\")\n\tfor i, method := range service.Method {\n\t\tg.gen.PrintComments(fmt.Sprintf(\"%s,2,%d\", path, i)) // 2 means method in a service.\n\t\tg.P(g.generateClientSignature(servName, method))\n\t}\n\tg.P(\"}\")\n\tg.P()\n\n\t// Client structure.\n\tg.P(\"type \", unexport(servAlias), \" struct {\")\n\tg.P(\"RPCInvoker *\", corePkg, \".RPCInvoker\")\n\tg.P(\"context \", contextPkg, \".Context\")\n\tg.P(\"serviceName \", \"string\")\n\tg.P(\"}\")\n\tg.P()\n\n\tg.P(\"var _ \", servAlias, \" = &\", unexport(servAlias), \"{}\")\n\n\t// newCotext\n\t/*\n\t\tfunc newContext(ctx context.Context) context.Context {\n\t\t\tmd, _ := metadata.FromIncomingContext(ctx)\n\t\t\tvar header = make(map[string]string)\n\t\t\tfor key, value := range md {\n\t\t\t\tif len(value) > 0 {\n\t\t\t\t\theader[key] = value[0]\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn common.NewContext(header)\n\t\t}\n\t*/\n\tg.P(\"func newContext(ctx \", contextPkg, \".Context\", \") \", contextPkg, \".Context {\")\n\tg.P(\"md, _ := \", metadataPkg, \".FromIncomingContext(ctx)\")\n\tg.P(\"var header = make(map[string]string)\")\n\tg.P(\"for key, value := range md {\")\n\tg.P(\"if len(value)>0 { header[key]=value[0] }\")\n\tg.P(\"}\")\n\tg.P(\"return \", commonPkg, \".NewContext(header)\")\n\tg.P(\"}\")\n\n\t// NewClient factory.\n\t/*\n\t\tfunc NewAccountService(ctx context.Context, opt ...core.Option) AccountService {\n\t\t\treturn &accountService{\n\t\t\t\tRPCInvoker: core.NewRPCInvoker(opt...),\n\t\t\t\tcontext: newContext(ctx),\n\t\t\t\tserviceName: serviceName,\n\t\t\t}\n\t\t}\n\t*/\n\tg.P(\"func New\", servAlias, \" (ctx \", contextPkg, \".Context, \", \"serviceName string, \", \"opt ...\", corePkg, \".Option) \", servAlias, \" {\")\n\tg.P(\"return &\", unexport(servAlias), \"{\")\n\tg.P(\"RPCInvoker: \", corePkg, \".NewRPCInvoker(opt...),\")\n\tg.P(\"context: newContext(ctx),\")\n\tg.P(\"serviceName: serviceName,\")\n\tg.P(\"}\")\n\tg.P(\"}\")\n\tg.P()\n\tvar methodIndex, streamIndex int\n\tserviceDescVar := \"_\" + servName + \"_serviceDesc\"\n\t// Client method implementations.\n\tfor _, method := range service.Method {\n\t\tvar descExpr string\n\t\tif !method.GetServerStreaming() {\n\t\t\t// Unary RPC method\n\t\t\tdescExpr = fmt.Sprintf(\"&%s.Methods[%d]\", serviceDescVar, methodIndex)\n\t\t\tmethodIndex++\n\t\t} else {\n\t\t\t// Streaming RPC method\n\t\t\tdescExpr = fmt.Sprintf(\"&%s.Streams[%d]\", serviceDescVar, streamIndex)\n\t\t\tstreamIndex++\n\t\t}\n\t\tg.generateClientMethod(serviceName, servName, serviceDescVar, method, descExpr)\n\t}\n\n\tg.P(\"// Server API for \", servName, \" service\")\n\tg.P()\n}", "title": "" }, { "docid": "965524a0a5af6fcd029fa5116b7208ed", "score": "0.52267426", "text": "func newService(name, cmd, description, workingDir, logFile string, dependencies []string, environ map[string]string) Service {\n\tif _, err := os.Stat(\"/run/systemd/system\"); err == nil {\n\t\treturn newSystemDService(name, cmd, description, workingDir, logFile, dependencies, environ)\n\t}\n\n\tif _, err := os.Stat(\"/sbin/initctl\"); err == nil {\n\t\treturn newUpstartService(name, cmd, description, workingDir, logFile, dependencies, environ)\n\t}\n\n\tif _, err := os.Stat(\"/sbin/procd\"); err == nil {\n\t\treturn newProcDService(name, cmd, description, workingDir, logFile, dependencies, environ)\n\t}\n\n\treturn newSystemVService(name, cmd, description, workingDir, logFile, dependencies, environ)\n}", "title": "" }, { "docid": "57842030bf474c4b5cfd9e636a48ffc0", "score": "0.52041644", "text": "func NewService(start func(Routines) error) Service {\n\tif start == nil {\n\t\tstart = func(rtns Routines) error {\n\t\t\treturn errors.NilArgument(\"start\").Type(start)\n\t\t}\n\t}\n\treturn &service{start: start}\n}", "title": "" }, { "docid": "df692586034c9ff631adac8fd8733b0b", "score": "0.5183632", "text": "func (r *Reconciler) makeService(src *sourcesv1alpha1.HTTPSource) *corev1.Service {\n\n\treturn object.NewService(src.Namespace, src.Name,\n\t\tobject.WithControllerRef(src.ToOwner()),\n\t\tobject.WithSelector(applicationNameLabelKey, src.Name),\n\t\tobject.WithServicePort(portName, externalPort, int(r.adapterEnvCfg.Port)),\n\t\tobject.WithServicePort(metricsPortName, metricsPort, metricsPort),\n\t\tobject.WithLabel(applicationNameLabelKey, src.Name),\n\t\tobject.WithLabel(dashboardLabelKey, dashboardLabelValue),\n\t)\n}", "title": "" }, { "docid": "6ab13980174ed911b8d45f5aa3a2e5d7", "score": "0.51117164", "text": "func newServiceManager(c *Server, o *Overlay) *serviceManager {\n\tservices := make(map[ServiceID]Service)\n\ts := &serviceManager{services, c, network.NewRoutineDispatcher()}\n\tids := ServiceFactory.registeredServiceIDs()\n\tfor _, id := range ids {\n\t\tname := ServiceFactory.Name(id)\n\t\tlog.Lvl3(\"Starting service\", name)\n\t\tcont := newContext(c, o, id, s)\n\t\ts, err := ServiceFactory.start(name, cont)\n\t\tif err != nil {\n\t\t\tlog.Error(\"Trying to instantiate service:\", err)\n\t\t}\n\t\tlog.Lvl3(\"Started Service\", name)\n\t\tservices[id] = s\n\t\tc.websocket.registerService(name, s)\n\t}\n\tlog.Lvl3(c.Address(), \"instantiated all services\")\n\treturn s\n}", "title": "" }, { "docid": "56fa9b7e66880ee0ac8c084c0742c405", "score": "0.50996226", "text": "func NewService() Service {\n return QAService {}\n}", "title": "" }, { "docid": "461019d0aa779cc2d8f67fb7350c07da", "score": "0.50719637", "text": "func GenerateService(port int32, portName string) (*v1.Service, error) {\n\toperatorName, err := k8sutil.GetOperatorName()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tnamespace, err := k8sutil.GetOperatorNamespace()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tservice := &v1.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: operatorName,\n\t\t\tNamespace: namespace,\n\t\t\tLabels: map[string]string{\"name\": operatorName},\n\t\t},\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"Service\",\n\t\t\tAPIVersion: \"v1\",\n\t\t},\n\t\tSpec: v1.ServiceSpec{\n\t\t\tPorts: []v1.ServicePort{\n\t\t\t\t{\n\t\t\t\t\tPort: port,\n\t\t\t\t\tProtocol: v1.ProtocolTCP,\n\t\t\t\t\tTargetPort: intstr.IntOrString{\n\t\t\t\t\t\tType: intstr.Int,\n\t\t\t\t\t\tIntVal: port,\n\t\t\t\t\t},\n\t\t\t\t\tName: portName,\n\t\t\t\t},\n\t\t\t},\n\t\t\tSelector: map[string]string{\"name\": operatorName},\n\t\t},\n\t}\n\treturn service, nil\n}", "title": "" }, { "docid": "624a6350d31187eab2125fb257604ab1", "score": "0.50582683", "text": "func NewService(ctx *pulumi.Context,\n\tname string, args *ServiceArgs, opts ...pulumi.ResourceOption) (*Service, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.SourceConfiguration == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'SourceConfiguration'\")\n\t}\n\topts = internal.PkgResourceDefaultOpts(opts)\n\tvar resource Service\n\terr := ctx.RegisterResource(\"aws-native:apprunner:Service\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "892d317ff962b661cf32be0c4d2eae44", "score": "0.5035062", "text": "func CreateService(){\n\t\n}", "title": "" }, { "docid": "693606cf72c1f90c96b51395fe6042b6", "score": "0.5014661", "text": "func NewService(run, revive string) *Service {\n\treturn &Service{\n\t\tID: util.NewUUID(),\n\t\tType: common.TaskService,\n\t\tStatus: StatusOK,\n\t\tCommandRun: run,\n\t\tCommandRevive: revive,\n\t\tDebug: false,\n\t}\n}", "title": "" }, { "docid": "305a9fa4be13934fe103f7905f69fb38", "score": "0.49676862", "text": "func NewCmdService(name, fullName string) *cobra.Command {\n\tserviceCreateCmd := NewCmdServiceCreate(createRecommendedCommandName, util.GetFullName(fullName, createRecommendedCommandName))\n\tserviceListCmd := NewCmdServiceList(listRecommendedCommandName, util.GetFullName(fullName, listRecommendedCommandName))\n\tserviceDeleteCmd := NewCmdServiceDelete(deleteRecommendedCommandName, util.GetFullName(fullName, deleteRecommendedCommandName))\n\tserviceCmd := &cobra.Command{\n\t\tUse: name,\n\t\tShort: \"Perform service catalog operations\",\n\t\tLong: serviceLongDesc,\n\t\tExample: fmt.Sprintf(\"%s\\n\\n%s\\n\\n%s\",\n\t\t\tserviceCreateCmd.Example,\n\t\t\tserviceDeleteCmd.Example,\n\t\t\tserviceListCmd.Example),\n\t\tArgs: cobra.RangeArgs(1, 3),\n\t}\n\t// Add a defined annotation in order to appear in the help menu\n\tserviceCmd.Annotations = map[string]string{\"command\": \"main\"}\n\tserviceCmd.SetUsageTemplate(util.CmdUsageTemplate)\n\tserviceCmd.AddCommand(serviceCreateCmd, serviceDeleteCmd, serviceListCmd)\n\n\t//Adding `--project` flag\n\tprojectCmd.AddProjectFlag(serviceCreateCmd)\n\tprojectCmd.AddProjectFlag(serviceDeleteCmd)\n\tprojectCmd.AddProjectFlag(serviceListCmd)\n\n\t//Adding `--application` flag\n\tappCmd.AddApplicationFlag(serviceCreateCmd)\n\tappCmd.AddApplicationFlag(serviceDeleteCmd)\n\tappCmd.AddApplicationFlag(serviceListCmd)\n\n\treturn serviceCmd\n}", "title": "" }, { "docid": "7d33b8fa9ffc091f8a3c4fe08b06ee78", "score": "0.4960278", "text": "func CreateServiceCommand(_ *cobra.Command, args []string) error {\n\tdirName := args[0]\n\tif len(VarStringStyle) == 0 {\n\t\tVarStringStyle = conf.DefaultFormat\n\t}\n\tif strings.Contains(dirName, \"-\") {\n\t\treturn errors.New(\"api new command service name not support strikethrough, because this will used by function name\")\n\t}\n\n\tabs, err := filepath.Abs(dirName)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = pathx.MkdirIfNotExist(abs)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdirName = filepath.Base(filepath.Clean(abs))\n\tfilename := dirName + \".api\"\n\tapiFilePath := filepath.Join(abs, filename)\n\tfp, err := os.Create(apiFilePath)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdefer fp.Close()\n\n\tif len(VarStringRemote) > 0 {\n\t\trepo, _ := util.CloneIntoGitHome(VarStringRemote, VarStringBranch)\n\t\tif len(repo) > 0 {\n\t\t\tVarStringHome = repo\n\t\t}\n\t}\n\n\tif len(VarStringHome) > 0 {\n\t\tpathx.RegisterGoctlHome(VarStringHome)\n\t}\n\n\ttext, err := pathx.LoadTemplate(category, apiTemplateFile, apiTemplate)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tt := template.Must(template.New(\"template\").Parse(text))\n\tif err := t.Execute(fp, map[string]string{\n\t\t\"name\": dirName,\n\t\t\"handler\": strings.Title(dirName),\n\t}); err != nil {\n\t\treturn err\n\t}\n\n\terr = gogen.DoGenProject(apiFilePath, abs, VarStringStyle)\n\treturn err\n}", "title": "" }, { "docid": "e04227bf65ef89d98e8043381edc967c", "score": "0.49594048", "text": "func NewService(configurable configurable.Configurable) GnmiService {\n\treturn newService(configurable)\n}", "title": "" }, { "docid": "d056afb38ffb4a24f4d26f1bf5d29582", "score": "0.49529818", "text": "func newServiceForCR(cr *androidv1alpha1.AndroidFarm) *corev1.Service {\n\treturn &corev1.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: cr.RethinkDBName(),\n\t\t\tNamespace: cr.STFConfig().GetNamespace(),\n\t\t\tLabels: cr.RethinkDBLabels(\"rethinkdb\"),\n\t\t\tOwnerReferences: cr.OwnerReferences(),\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tClusterIP: \"None\",\n\t\t\tPorts: []corev1.ServicePort{\n\t\t\t\t{\n\t\t\t\t\tName: \"driver-port\",\n\t\t\t\t\tPort: int32(28015),\n\t\t\t\t\tTargetPort: intstr.Parse(\"28015\"),\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tName: \"cluster-port\",\n\t\t\t\t\tPort: int32(29015),\n\t\t\t\t\tTargetPort: intstr.Parse(\"29015\"),\n\t\t\t\t},\n\t\t\t},\n\t\t\tSelector: cr.RethinkDBLabels(\"rethinkdb\"),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "8dc06d8e2d3f22502bb6f3a809cc978b", "score": "0.49489933", "text": "func New(c *conf.Config) (s *Service) {\n\ts = &Service{\n\t\tc: c,\n\t\t// dao\n\t\tarc: arcdao.New(c),\n\t\tshare: shareDao.New(c),\n\t\tshot: shotDao.New(c),\n\t\t// acc rpc\n\t\t// acc: accrpc.New2(c.AccountRPC),\n\t\t// types\n\t\tallTypes: make(map[int16]*archive.ArcType),\n\t\tridToReid: make(map[int16]int16),\n\t\t// cache chan\n\t\tcacheCh: make(chan func(), 1024),\n\t\t// prom\n\t\thitProm: prom.CacheHit,\n\t\tmissProm: prom.CacheMiss,\n\t\tbnjList: make(map[int64]struct{}),\n\t}\n\ts.loadBnjList()\n\ts.loadTypes()\n\tgo s.loadproc()\n\tfor i := 0; i < runtime.NumCPU(); i++ {\n\t\tgo s.cacheproc()\n\t}\n\treturn\n}", "title": "" }, { "docid": "8ba49b77678ecfa6e98c457c383f287f", "score": "0.49177864", "text": "func NewService(r Repository, client protobuf.PersonReceiverClient, hk string) UseCase {\n\treturn &service{\n\t\trepo: r,\n\t\tclient: client,\n\t\thashKey: hk,\n\t}\n}", "title": "" }, { "docid": "b79e8e6fe10dac126a253b5aa47d8e21", "score": "0.49169248", "text": "func createBuildService() *Service {\n\treturn &Service{\n\t\tCreate: CreateBuildTable,\n\t\tIndexes: []string{CreateBuildRepoIDIndex, CreateBuildRepoIDNumberIndex, CreateBuildStatusIndex},\n\t}\n}", "title": "" }, { "docid": "a1dde6a0beb031ffacafb8ffdeb41f7b", "score": "0.49093935", "text": "func NewCommunicationService(ctx *pulumi.Context,\n\tname string, args *CommunicationServiceArgs, opts ...pulumi.ResourceOption) (*CommunicationService, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.DataLocation == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'DataLocation'\")\n\t}\n\tif args.ResourceGroupName == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'ResourceGroupName'\")\n\t}\n\taliases := pulumi.Aliases([]pulumi.Alias{\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:communication:CommunicationService\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:communication/v20200820:CommunicationService\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:communication/v20200820:CommunicationService\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-native:communication/v20200820preview:CommunicationService\"),\n\t\t},\n\t\t{\n\t\t\tType: pulumi.String(\"azure-nextgen:communication/v20200820preview:CommunicationService\"),\n\t\t},\n\t})\n\topts = append(opts, aliases)\n\tvar resource CommunicationService\n\terr := ctx.RegisterResource(\"azure-native:communication:CommunicationService\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "5dfd0218bbeba42279eb31091024dcd1", "score": "0.48955712", "text": "func NewService(config ServiceConfig) (Service, error) {\n\t// Dependencies.\n\tif config.IDService == nil {\n\t\treturn nil, maskAnyf(invalidConfigError, \"id service must not be empty\")\n\t}\n\tif config.InstrumentorCollection == nil {\n\t\treturn nil, maskAnyf(invalidConfigError, \"instrumentor collection must not be empty\")\n\t}\n\tif config.RandomService == nil {\n\t\treturn nil, maskAnyf(invalidConfigError, \"random service must not be empty\")\n\t}\n\tif config.StorageCollection == nil {\n\t\treturn nil, maskAnyf(invalidConfigError, \"storage collection must not be empty\")\n\t}\n\tif config.WorkerService == nil {\n\t\treturn nil, maskAnyf(invalidConfigError, \"worker service must not be empty\")\n\t}\n\n\tnewService := &service{\n\t\t// Dependencies.\n\t\tid: config.IDService,\n\t\tinstrumentor: config.InstrumentorCollection,\n\t\trandom: config.RandomService,\n\t\tstorage: config.StorageCollection,\n\t\tworker: config.WorkerService,\n\n\t\t// Internals.\n\t\tbootOnce: sync.Once{},\n\t\tcloser: make(chan struct{}, 1),\n\t\tmutex: sync.Mutex{},\n\t\tpieces: map[string][]interface{}{},\n\t\trulers: map[string]func(ctx context.Context, labels []string) (string, error){},\n\t\tshutdownOnce: sync.Once{},\n\t}\n\n\treturn newService, nil\n}", "title": "" }, { "docid": "2890b12de80dbc2c6e600b2f4af8b330", "score": "0.48804018", "text": "func MakeService(source *sourcesv1alpha1.BitBucketSource, receiveAdapterImage string) *servingv1alpha1.Service {\n\tlabels := map[string]string{\n\t\t\"receive-adapter\": \"bitbucket\",\n\t}\n\tsinkURI := source.Status.SinkURI\n\tenv := []corev1.EnvVar{\n\t\t// TODO should also pass the UUID of the webhook so that the receive adapter can validate that the\n\t\t// incoming events correspond to that particular webhook, and discard them otherwise.\n\t\t// There is a chicken and egg problem: in order to create the webhook, we need the service domain, but\n\t\t// the service container image needs the webhook UUID that we get when the webhook is created.\n\t\t// We need to properly populate this in a reconcile loop.\n\t\t{\n\t\t\tName: \"BITBUCKET_UUID\",\n\t\t\tValue: source.Status.WebhookUUIDKey,\n\t\t},\n\t\t{\n\t\t\tName: \"SINK\",\n\t\t\tValue: sinkURI,\n\t\t},\n\t}\n\tcontainerArgs := []string{fmt.Sprintf(\"--sink=%s\", sinkURI)}\n\treturn &servingv1alpha1.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tGenerateName: fmt.Sprintf(\"%s-\", source.Name),\n\t\t\tNamespace: source.Namespace,\n\t\t\tLabels: labels,\n\t\t},\n\t\tSpec: servingv1alpha1.ServiceSpec{\n\t\t\tRunLatest: &servingv1alpha1.RunLatestType{\n\t\t\t\tConfiguration: servingv1alpha1.ConfigurationSpec{\n\t\t\t\t\tRevisionTemplate: servingv1alpha1.RevisionTemplateSpec{\n\t\t\t\t\t\tSpec: servingv1alpha1.RevisionSpec{\n\t\t\t\t\t\t\tServiceAccountName: source.Spec.ServiceAccountName,\n\t\t\t\t\t\t\tContainer: corev1.Container{\n\t\t\t\t\t\t\t\tImage: receiveAdapterImage,\n\t\t\t\t\t\t\t\tEnv: env,\n\t\t\t\t\t\t\t\tArgs: containerArgs,\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "a2e0c7e4c1b94d9f354094077955babf", "score": "0.48797208", "text": "func (t *sanrpc) generateService(file *generator.FileDescriptor, service *pb.ServiceDescriptorProto, index int) {\n\tserviceName := service.GetName()\n\tt.P(\"// This following code was generated by sanrpc\")\n\tt.P(fmt.Sprintf(\"// Gernerated from %s\", file.GetName()))\n\tt.P(fmt.Sprintf(`type %s struct {\n\t\ts model.Servant\n\t}\n\t`, serviceName))\n\tt.P()\n\n\t//generate SetServant\n\tt.P(fmt.Sprintf(`//SetServant is required by the servant interface.\n\tfunc (obj *%s) SetServant(s model.Servant){\n\t\tobj.s = s\n\t}\n\t`, serviceName))\n\tt.P()\n\t//generate AddServant\n\tt.P(fmt.Sprintf(`//AddServant is required by the servant interface\n\tfunc (obj *%s) AddServant(imp imp%s, objStr string){\n\t\ttars.AddServant(obj, imp, objStr)\n\t}`, serviceName, serviceName))\n\n\t//generate TarsSetTimeout\n\tt.P(fmt.Sprintf(`//TarsSetTimeout is required by the servant interface. t is the timeout in ms. \n\tfunc (obj *%s) TarsSetTimeout(t int){\n\t\tobj.s.TarsSetTimeout(t)\n\t}\n\t`, serviceName))\n\tt.P()\n\n\t//generate the interface\n\tt.P(fmt.Sprintf(\"type imp%s interface{\", serviceName))\n\tfor _, method := range service.Method {\n\t\tt.P(fmt.Sprintf(\"%s (input %s) (output %s, err error)\",\n\t\t\tmethod.GetName(), t.typeName(method.GetInputType()), t.typeName(method.GetOutputType())))\n\t}\n\tt.P(\"}\")\n\tt.P()\n\n\tfor _, method := range service.Method {\n\t\tt.generateClientCode(service, method)\n\t}\n}", "title": "" }, { "docid": "2655d583c40637164fd0e6e554e9aea3", "score": "0.48741558", "text": "func (i *natsInstaller) buildStanService() (*corev1.Service, error) {\n\tsvc := &corev1.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: generateServiceName(i.eventBus),\n\t\t\tNamespace: i.eventBus.Namespace,\n\t\t\tLabels: i.mergeEventBusLabels(stanServiceLabels(i.labels)),\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tClusterIP: corev1.ClusterIPNone,\n\t\t\tPorts: []corev1.ServicePort{\n\t\t\t\t// Prefix tcp- to enable clients to connect from\n\t\t\t\t// an istio-enabled namespace, following:\n\t\t\t\t// https://github.com/nats-io/nats-operator/issues/88\n\t\t\t\t// https://github.com/istio/istio/issues/28623\n\t\t\t\t{Name: \"tcp-client\", Port: clientPort},\n\t\t\t\t{Name: \"cluster\", Port: clusterPort},\n\t\t\t\t{Name: \"monitor\", Port: monitorPort},\n\t\t\t},\n\t\t\tType: corev1.ServiceTypeClusterIP,\n\t\t\tSelector: i.labels,\n\t\t},\n\t}\n\tif err := controllerscommon.SetObjectMeta(i.eventBus, svc, v1alpha1.SchemaGroupVersionKind); err != nil {\n\t\treturn nil, err\n\t}\n\treturn svc, nil\n}", "title": "" }, { "docid": "1136350dabb186b4129459f410819856", "score": "0.48711336", "text": "func NewService(initConstants CMPServerInitConstants) *Service {\n\treturn &Service{\n\t\tinitConstants: initConstants,\n\t}\n}", "title": "" }, { "docid": "0de88b77e5d9abd33dd2bd070fc2f250", "score": "0.48663744", "text": "func (s *AppServer) NewService(svc Servicer) *AppServer {\n\t// first, try to register all interceptorss defined by service\n\ts.WithInterceptors(svc)\n\n\t// second, try to register all resources with filters\n\ts.localMux.Lock()\n\tdefer s.localMux.Unlock()\n\n\tsvc.Init(s.config, s.AppGroup)\n\n\t// register filters\n\tsvc.Middlewares()\n\n\t// register resources\n\tsvc.Resources()\n\n\treturn s\n}", "title": "" }, { "docid": "218ce197bf4a58a44f34479c7484dc94", "score": "0.4862125", "text": "func New(\n\tacts activity.Repository,\n) Service {\n\treturn &svc{\n\t\tact: acts,\n\t}\n}", "title": "" }, { "docid": "367ca97400567f76cd137aeb5abafdd9", "score": "0.4856248", "text": "func (r *ReconcileHapContainer) newServiceForCR(cr *hapv1alpha1.HapContainer) *corev1.Service {\n\tlabels := map[string]string{\n\t\t\"app\": cr.Name,\n\t}\n\treturn &corev1.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: cr.Name + \"-hapservice\",\n\t\t\tNamespace: cr.Namespace,\n\t\t\tLabels: labels,\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tSelector: labels,\n\t\t\tPorts: []corev1.ServicePort{{\n\t\t\t\tProtocol: corev1.ProtocolTCP,\n\t\t\t\tPort: 8888,\n\t\t\t\tName: \"http\",\n\t\t\t}, {\n\t\t\t\tProtocol: corev1.ProtocolTCP,\n\t\t\t\tPort: 4040,\n\t\t\t\tName: \"spark\",\n\t\t\t}},\n\t\t\tType: corev1.ServiceTypeNodePort,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "ae9c89ccbcd3f9d00f19fca205de2f1d", "score": "0.48430416", "text": "func _cgoexp_ebd397278953_new_holochain_Service(a unsafe.Pointer, n int32, ctxt uintptr) {\n\tfn := _cgoexpwrap_ebd397278953_new_holochain_Service\n\t_cgo_runtime_cgocallback(**(**unsafe.Pointer)(unsafe.Pointer(&fn)), a, uintptr(n), ctxt);\n}", "title": "" }, { "docid": "40b662ac2a34255b633eb7f03bcb8f37", "score": "0.4841831", "text": "func NewCodeGenerationServiceHandler(svc CodeGenerationServiceHandler, opts ...connect.HandlerOption) (string, http.Handler) {\n\tcodeGenerationServiceGenerateCodeHandler := connect.NewUnaryHandler(\n\t\tCodeGenerationServiceGenerateCodeProcedure,\n\t\tsvc.GenerateCode,\n\t\topts...,\n\t)\n\treturn \"/buf.alpha.registry.v1alpha1.CodeGenerationService/\", http.HandlerFunc(func(w http.ResponseWriter, r *http.Request) {\n\t\tswitch r.URL.Path {\n\t\tcase CodeGenerationServiceGenerateCodeProcedure:\n\t\t\tcodeGenerationServiceGenerateCodeHandler.ServeHTTP(w, r)\n\t\tdefault:\n\t\t\thttp.NotFound(w, r)\n\t\t}\n\t})\n}", "title": "" }, { "docid": "d94cd93d80c258371902368f307ba48e", "score": "0.4833726", "text": "func NewService(cfg ServiceConfig) (*Service, error) {\n\tsvc := graphql.NewService()\n\n\tnodeRegister := relay.NodeRegister{}\n\tnodeResolver := relay.Resolver{Register: &nodeRegister}\n\twrapper := Service{\n\t\tTarget: svc,\n\t\tConfig: &cfg,\n\t\tNodeRegister: &nodeRegister,\n\t}\n\n\t// Register types w/ generic node resolver\n\tregisterNodeResolvers(nodeRegister, cfg)\n\n\t// Register types\n\tschema.RegisterAsset(svc, &assetImpl{})\n\tschema.RegisterCoreV2AssetBuild(svc, &schema.CoreV2AssetBuildAliases{})\n\tschema.RegisterCoreV2Deregistration(svc, &schema.CoreV2DeregistrationAliases{})\n\tschema.RegisterCoreV2Network(svc, &schema.CoreV2NetworkAliases{})\n\tschema.RegisterCoreV2NetworkInterface(svc, &schema.CoreV2NetworkInterfaceAliases{})\n\tschema.RegisterCoreV2Pipeline(svc, &corev2PipelineImpl{})\n\tschema.RegisterCoreV2PipelineExtensionOverrides(svc, &corev2PipelineImpl{})\n\tschema.RegisterCoreV2PipelineWorkflow(svc, &schema.CoreV2PipelineWorkflowAliases{})\n\tschema.RegisterCoreV2Process(svc, &schema.CoreV2ProcessAliases{})\n\tschema.RegisterCoreV2ResourceReference(svc, &schema.CoreV2ResourceReferenceAliases{})\n\tschema.RegisterCoreV2Secret(svc, &schema.CoreV2SecretAliases{})\n\tschema.RegisterCoreV2System(svc, &schema.CoreV2SystemAliases{})\n\tschema.RegisterCoreV3EntityConfig(svc, &corev3EntityConfigImpl{})\n\tschema.RegisterCoreV3EntityConfigExtensionOverrides(svc, &corev3EntityConfigExtImpl{client: cfg.GenericClient, entityClient: cfg.EntityClient})\n\tschema.RegisterCoreV3EntityState(svc, &corev3EntityStateImpl{})\n\tschema.RegisterCoreV3EntityStateExtensionOverrides(svc, &corev3EntityStateExtImpl{client: cfg.GenericClient, entityClient: cfg.EntityClient})\n\tschema.RegisterNamespace(svc, &namespaceImpl{client: cfg.NamespaceClient, entityClient: cfg.EntityClient, eventClient: cfg.EventClient, serviceConfig: &cfg})\n\tschema.RegisterErrCode(svc)\n\tschema.RegisterEvent(svc, &eventImpl{})\n\tschema.RegisterEventsListOrder(svc)\n\tschema.RegisterJSON(svc, jsonImpl{})\n\tschema.RegisterKVPairString(svc, &schema.KVPairStringAliases{})\n\tschema.RegisterQuery(svc, &queryImpl{nodeResolver: &nodeResolver, svc: cfg})\n\tschema.RegisterMutator(svc, &mutatorImpl{})\n\tschema.RegisterMutatorConnection(svc, &schema.MutatorConnectionAliases{})\n\tschema.RegisterMutatorListOrder(svc)\n\tschema.RegisterNode(svc, &nodeImpl{&nodeResolver})\n\tschema.RegisterNamespaced(svc, nil)\n\tschema.RegisterObjectMeta(svc, &objectMetaImpl{})\n\tschema.RegisterOffsetPageInfo(svc, &offsetPageInfoImpl{})\n\tschema.RegisterProxyRequests(svc, &schema.ProxyRequestsAliases{})\n\tschema.RegisterResource(svc, nil)\n\tschema.RegisterResolveEventPayload(svc, &schema.ResolveEventPayloadAliases{})\n\tschema.RegisterSchema(svc)\n\tschema.RegisterSilenceable(svc, nil)\n\tschema.RegisterSilenced(svc, &silencedImpl{client: cfg.CheckClient})\n\tschema.RegisterSilencedConnection(svc, &schema.SilencedConnectionAliases{})\n\tschema.RegisterSilencesListOrder(svc)\n\tschema.RegisterSuggestionOrder(svc)\n\tschema.RegisterSuggestionResultSet(svc, &schema.SuggestionResultSetAliases{})\n\tschema.RegisterUint(svc, unsignedIntegerImpl{})\n\tschema.RegisterViewer(svc, &viewerImpl{userClient: cfg.UserClient})\n\n\t// Register check types\n\tschema.RegisterCheck(svc, &checkImpl{})\n\tschema.RegisterCheckConfig(svc, &checkCfgImpl{})\n\tschema.RegisterCheckConfigConnection(svc, &schema.CheckConfigConnectionAliases{})\n\tschema.RegisterCheckHistory(svc, &checkHistoryImpl{})\n\tschema.RegisterCheckListOrder(svc)\n\n\t// Register entity types\n\tschema.RegisterEntity(svc, &entityImpl{})\n\tschema.RegisterEntityConnection(svc, &schema.EntityConnectionAliases{})\n\tschema.RegisterEntityListOrder(svc)\n\tschema.RegisterDeregistration(svc, &deregistrationImpl{})\n\tschema.RegisterNetwork(svc, &networkImpl{})\n\tschema.RegisterNetworkInterface(svc, &networkInterfaceImpl{})\n\tschema.RegisterProcess(svc, &processImpl{})\n\tschema.RegisterSystem(svc, &systemImpl{})\n\n\t// Register event types\n\tschema.RegisterEvent(svc, &eventImpl{})\n\tschema.RegisterEventConnection(svc, &schema.EventConnectionAliases{})\n\n\t// Register event filter types\n\tschema.RegisterEventFilter(svc, &eventFilterImpl{})\n\tschema.RegisterEventFilterConnection(svc, &schema.EventFilterConnectionAliases{})\n\tschema.RegisterEventFilterAction(svc)\n\tschema.RegisterEventFilterListOrder(svc)\n\n\t// Register hook types\n\tschema.RegisterHook(svc, &hookImpl{})\n\tschema.RegisterHookConfig(svc, &hookCfgImpl{})\n\tschema.RegisterHookList(svc, &hookListImpl{})\n\n\t// Register handler types\n\tschema.RegisterHandler(svc, &handlerImpl{client: cfg.MutatorClient})\n\tschema.RegisterHandlerListOrder(svc)\n\tschema.RegisterHandlerConnection(svc, &schema.HandlerConnectionAliases{})\n\tschema.RegisterHandlerSocket(svc, &handlerSocketImpl{})\n\n\t// Register health types\n\tschema.RegisterClusterHealth(svc, &clusterHealthImpl{healthController: cfg.HealthController})\n\tschema.RegisterEtcdAlarmMember(svc, &etcdAlarmMemberImpl{})\n\tschema.RegisterEtcdAlarmType(svc)\n\tschema.RegisterEtcdClusterHealth(svc, &etcdClusterHealthImpl{})\n\tschema.RegisterEtcdClusterMemberHealth(svc, &etcdClusterMemberHealthImpl{})\n\n\t// Register metrics\n\tschema.RegisterBucketMetric(svc, &schema.BucketMetricAliases{})\n\tschema.RegisterCounterMetric(svc, &counterMetricImpl{})\n\tschema.RegisterGaugeMetric(svc, &gaugeMetricImpl{})\n\tschema.RegisterHistogramMetric(svc, &histogramMetricImpl{})\n\tschema.RegisterMetric(svc, &metricImpl{})\n\tschema.RegisterMetricFamily(svc, &metricFamilyImpl{})\n\tschema.RegisterMetricKind(svc)\n\tschema.RegisterQuantileMetric(svc, &schema.QuantileMetricAliases{})\n\tschema.RegisterSummaryMetric(svc, &summaryMetricImpl{})\n\tschema.RegisterUntypedMetric(svc, &untypedMetricImpl{})\n\n\t// Register time window\n\tschema.RegisterTimeWindowDays(svc, &schema.TimeWindowDaysAliases{})\n\tschema.RegisterTimeWindowWhen(svc, &schema.TimeWindowWhenAliases{})\n\tschema.RegisterTimeWindowTimeRange(svc, &schema.TimeWindowTimeRangeAliases{})\n\n\t// Register RBAC types\n\tschema.RegisterCoreV2ClusterRole(svc, &clusterRoleImpl{})\n\tschema.RegisterCoreV2ClusterRoleExtensionOverrides(svc, &clusterRoleImpl{})\n\tschema.RegisterCoreV2ClusterRoleBinding(svc, &clusterRoleBindingImpl{})\n\tschema.RegisterCoreV2ClusterRoleBindingExtensionOverrides(svc, &clusterRoleBindingImpl{})\n\tschema.RegisterCoreV2Role(svc, &roleImpl{})\n\tschema.RegisterCoreV2RoleExtensionOverrides(svc, &roleImpl{})\n\tschema.RegisterCoreV2RoleBinding(svc, &roleBindingImpl{})\n\tschema.RegisterCoreV2RoleBindingExtensionOverrides(svc, &roleBindingImpl{})\n\tschema.RegisterCoreV2RoleRef(svc, &schema.CoreV2RoleRefAliases{})\n\tschema.RegisterCoreV2Rule(svc, &schema.CoreV2RuleAliases{})\n\tschema.RegisterCoreV2Subject(svc, &schema.CoreV2SubjectAliases{})\n\n\t// Register user types\n\tschema.RegisterUser(svc, &userImpl{})\n\n\t// Register version types\n\tschema.RegisterVersions(svc, &versionsImpl{})\n\tschema.RegisterEtcdVersions(svc, &schema.EtcdVersionsAliases{})\n\tschema.RegisterSensuBackendVersion(svc, &sensuBackendVersionImpl{})\n\n\t// Register mutations\n\tschema.RegisterMutation(svc, &mutationsImpl{svc: cfg})\n\tschema.RegisterCheckConfigInputs(svc)\n\tschema.RegisterCreateCheckInput(svc)\n\tschema.RegisterCreateCheckPayload(svc, &checkMutationPayload{})\n\tschema.RegisterCreateSilenceInput(svc)\n\tschema.RegisterCreateSilencePayload(svc, &schema.CreateSilencePayloadAliases{})\n\tschema.RegisterDeleteRecordInput(svc)\n\tschema.RegisterDeleteRecordPayload(svc, &deleteRecordPayload{})\n\tschema.RegisterExecuteCheckInput(svc)\n\tschema.RegisterExecuteCheckPayload(svc, &schema.ExecuteCheckPayloadAliases{})\n\tschema.RegisterResolveEventInput(svc)\n\tschema.RegisterSilenceInputs(svc)\n\tschema.RegisterUpdateCheckInput(svc)\n\tschema.RegisterUpdateCheckPayload(svc, &checkMutationPayload{})\n\tschema.RegisterPutWrappedPayload(svc, &schema.PutWrappedPayloadAliases{})\n\n\t// Errors\n\tschema.RegisterStandardError(svc, stdErrImpl{})\n\tschema.RegisterError(svc, &errImpl{})\n\n\t// Run init hooks allowing consumers to extend service\n\tfor _, hookFn := range InitHooks {\n\t\thookFn(svc, cfg)\n\t}\n\n\t// Configure tracing\n\ttracer := tracing.NewPrometheusTracer()\n\ttracer.AllowList = []string{\n\t\ttracing.KeyParse,\n\t\ttracing.KeyValidate,\n\t\ttracing.KeyExecuteQuery,\n\t\ttracing.KeyExecuteField,\n\t}\n\tsvc.RegisterMiddleware(tracer)\n\n\terr := svc.Regenerate()\n\treturn &wrapper, err\n}", "title": "" }, { "docid": "2968fe6592b0dab6acd6e6f3e949f8f9", "score": "0.48330107", "text": "func NewRuntimeContextService(t mockConstructorTestingTNewRuntimeContextService) *RuntimeContextService {\n\tmock := &RuntimeContextService{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "3462d91d6b814e604d34b21fe52b33fa", "score": "0.4814867", "text": "func NewService(c *meta.Config, d *Config) *Service {\n\ts := &Service{\n\t\terr: make(chan error),\n\t\tMeta: c,\n\t\tGulpd: d,\n\t}\n\ts.Handler = NewHandler(s.Gulpd)\n\tc.MC() //an accessor.\n\treturn s\n}", "title": "" }, { "docid": "fa9930be1bd5f004524f659802c27f8b", "score": "0.48104563", "text": "func GenerateService(mattermost *mattermostv1alpha1.ClusterInstallation, serviceName, selectorName string) *corev1.Service {\n\tbaseAnnotations := map[string]string{\n\t\t\"service.alpha.kubernetes.io/tolerate-unready-endpoints\": \"true\",\n\t}\n\n\tif mattermost.Spec.UseServiceLoadBalancer {\n\t\t// Create a LoadBalancer service with additional annotations provided in\n\t\t// the Mattermost Spec. The LoadBalancer is directly accessible from\n\t\t// outside the cluster thus exposes ports 80 and 443.\n\t\tservice := newService(mattermost, serviceName, selectorName,\n\t\t\tmergeStringMaps(baseAnnotations, mattermost.Spec.ServiceAnnotations),\n\t\t)\n\t\treturn configureMattermostLoadBalancerService(service)\n\t}\n\n\t// Create a headless service which is not directly accessible from outside\n\t// the cluster and thus exposes a custom port.\n\tservice := newService(mattermost, serviceName, selectorName, baseAnnotations)\n\treturn configureMattermostService(service)\n}", "title": "" }, { "docid": "6f3af96fe7587b3feaa6b0414da7774f", "score": "0.4809808", "text": "func GenerateSvc(rss *unifflev1alpha1.RemoteShuffleService, index int) *corev1.Service {\n\tname := GenerateNameByIndex(rss, index)\n\tsvc := &corev1.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: rss.Namespace,\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tType: corev1.ServiceTypeNodePort,\n\t\t\tSelector: map[string]string{\n\t\t\t\t\"app\": name,\n\t\t\t},\n\t\t\tPorts: []corev1.ServicePort{\n\t\t\t\t{\n\t\t\t\t\tName: \"rpc\",\n\t\t\t\t\tProtocol: corev1.ProtocolTCP,\n\t\t\t\t\tPort: controllerconstants.ContainerCoordinatorRPCPort,\n\t\t\t\t\tTargetPort: intstr.FromInt(int(*rss.Spec.Coordinator.RPCPort)),\n\t\t\t\t\tNodePort: rss.Spec.Coordinator.RPCNodePort[index],\n\t\t\t\t},\n\t\t\t\t{\n\t\t\t\t\tName: \"http\",\n\t\t\t\t\tProtocol: corev1.ProtocolTCP,\n\t\t\t\t\tPort: controllerconstants.ContainerCoordinatorHTTPPort,\n\t\t\t\t\tTargetPort: intstr.FromInt(int(*rss.Spec.Coordinator.HTTPPort)),\n\t\t\t\t\tNodePort: rss.Spec.Coordinator.HTTPNodePort[index],\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\tutil.AddOwnerReference(&svc.ObjectMeta, rss)\n\treturn svc\n}", "title": "" }, { "docid": "2f5857b59e1e03a0c8719bd131b0d8a8", "score": "0.4809167", "text": "func newRoutineCmd(*launchArgs) (*routineCmd, error) {\n\treturn &routineCmd{}, nil\n}", "title": "" }, { "docid": "fe14f4397ab396ac480e4497b8f88635", "score": "0.48088378", "text": "func NewPermissionService(client *client.Client, privateKey *ecdsa.PrivateKey) (*PermissionService, error) {\n\tinstance, err := NewPermission(PermissionPrecompileAddress, client)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"construct PermissionService failed: %+v\", err)\n\t}\n\tauth := bind.NewKeyedTransactor(privateKey)\n\tauth.GasLimit = big.NewInt(30000000)\n return &PermissionService{permission:instance, permissionAuth:auth, client: client, privateKey:privateKey}, nil\n}", "title": "" }, { "docid": "b878b464622c439490d40860ef518884", "score": "0.48031628", "text": "func NewCalculatorService(s interface{}) *CalculatorService {\n\tns := &CalculatorService{}\n\tif h, ok := s.(interface {\n\t\tAdd(Calculator_AddServer) error\n\t}); ok {\n\t\tns.Add = h.Add\n\t}\n\treturn ns\n}", "title": "" }, { "docid": "a1028aa62e7e0574636ab751dad76717", "score": "0.48028123", "text": "func NewPermissionService(client *client.Client) (*Service, error) {\n\tinstance, err := NewPermission(permissionPrecompileAddress, client)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"construct PermissionService failed: %+v\", err)\n\t}\n\tauth := client.GetTransactOpts()\n\treturn &Service{permission: instance, permissionAuth: auth, client: client}, nil\n}", "title": "" }, { "docid": "e753eece986c1159639e61c915ea930a", "score": "0.48016265", "text": "func launchService(s *grpc.Server) error {\n\treturn nil\n}", "title": "" }, { "docid": "99e53fae2d02d5be98a860fe56ba517c", "score": "0.48011196", "text": "func NewService(c *Config) *Service {\n\ts := &Service{\n\t\tconfig: c,\n\t\thttpAddr: c.HTTPBindAddress,\n\t\traftAddr: c.BindAddress,\n\t\tLogger: zap.NewNop(),\n\t\thttps: c.HTTPSEnabled,\n\t\tcert: c.HTTPSCertificate,\n\t\terr: make(chan error),\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "029c68c91d700f9b323d66c434cf8c08", "score": "0.47829404", "text": "func NewService(repo Repository, ghRepository repositories.Repository, claRepository projects_cla_groups.Repository) Service {\n\treturn service{\n\t\trepo: repo,\n\t\tghRepository: ghRepository,\n\t\tclaRepository: claRepository,\n\t}\n}", "title": "" }, { "docid": "56643659d76da8ac8f4dee3122d406c0", "score": "0.47789282", "text": "func New(c *conf.Config) (s *Service) {\n\ts = &Service{\n\t\tconf: c,\n\t\tdao: dao.New(c),\n\t\tcaptcha: newCaptcha(c.Captcha),\n\t\tcacheCh: cache.New(1, 1024),\n\t\tmCode: make(map[string][]string, len(c.Business)),\n\t\tmImage: make(map[string]map[string][]byte, len(c.Business)),\n\t}\n\tgo s.generaterProc()\n\treturn s\n}", "title": "" }, { "docid": "cdba6144459c7fefdfeee7df47866a22", "score": "0.47757694", "text": "func NewService(r Repo) Service {\n\treturn basicService{r}\n}", "title": "" }, { "docid": "3b4f3164c138a579c0ff8979b945a691", "score": "0.47752783", "text": "func (i *natsInstaller) createStanService(ctx context.Context) (*corev1.Service, error) {\n\tlog := i.logger\n\tsvc, err := i.getStanService(ctx)\n\tif err != nil && !apierrors.IsNotFound(err) {\n\t\ti.eventBus.Status.MarkDeployFailed(\"GetServiceFailed\", \"Get existing service failed\")\n\t\tlog.Errorw(\"Error getting existing service\", zap.Error(err))\n\t\treturn nil, err\n\t}\n\texpectedSvc, err := i.buildStanService()\n\tif err != nil {\n\t\ti.eventBus.Status.MarkDeployFailed(\"BuildServiceFailed\", \"Failed to build a service spec\")\n\t\tlog.Errorw(\"Error building service spec\", zap.Error(err))\n\t\treturn nil, err\n\t}\n\tif svc != nil {\n\t\t// TODO: potential issue here - if service spec is updated manually, reconciler will not change it back.\n\t\t// Revisit it later to see if it is needed to compare the spec.\n\t\tif svc.Annotations != nil && svc.Annotations[common.AnnotationResourceSpecHash] != expectedSvc.Annotations[common.AnnotationResourceSpecHash] {\n\t\t\tsvc.Spec = expectedSvc.Spec\n\t\t\tsvc.SetLabels(expectedSvc.Labels)\n\t\t\tsvc.Annotations[common.AnnotationResourceSpecHash] = expectedSvc.Annotations[common.AnnotationResourceSpecHash]\n\t\t\terr = i.client.Update(ctx, svc)\n\t\t\tif err != nil {\n\t\t\t\ti.eventBus.Status.MarkDeployFailed(\"UpdateServiceFailed\", \"Failed to update existing service\")\n\t\t\t\tlog.Errorw(\"Error updating existing service\", zap.Error(err))\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tlog.Infow(\"Service is updated\", \"serviceName\", svc.Name)\n\t\t}\n\t\treturn svc, nil\n\t}\n\terr = i.client.Create(ctx, expectedSvc)\n\tif err != nil {\n\t\ti.eventBus.Status.MarkDeployFailed(\"CreateServiceFailed\", \"Failed to create a service\")\n\t\tlog.Errorw(\"Error creating a service\", zap.Error(err))\n\t\treturn nil, err\n\t}\n\tlog.Infow(\"Service is created\", \"serviceName\", expectedSvc.Name)\n\treturn expectedSvc, nil\n}", "title": "" }, { "docid": "bb5a06fd49eb44bc66277f5ddf8f474a", "score": "0.47732833", "text": "func NewService(desc *LinkDescriptor, master Linkage) *Service {\n\tsv := &Service{\n\t\tgrids.NewGrid(desc.Service),\n\t\tdesc,\n\t\tmaster,\n\t\tgoutils.NewMap(),\n\t\tgoutils.NewMap(),\n\t\troutes.NewRoutes(desc.Service),\n\t}\n\n\tsv.Route.Branch(\"discover\")\n\tsv.Route.Branch(\"register\")\n\tsv.Route.Branch(\"unregister\")\n\tsv.Route.Branch(\"api\")\n\n\tif sv.Master != nil {\n\t\terr := sv.Master.Register(desc.Service, sv.GetDescriptor(), func(d ...interface{}) {\n\t\t\t//maybe\n\t\t})\n\n\t\tif err != nil {\n\t\t\tlog.Fatal(\"unable to register with master:\", desc.Service, err)\n\t\t}\n\n\t}\n\n\treturn sv\n}", "title": "" }, { "docid": "0b4923397c774cd9bbbcbd6029dc1512", "score": "0.4772869", "text": "func NewService(cargos cargo.Repository, events cargo.HandlingEventRepository) Service {\n\treturn &service{\n\t\tcargos: cargos,\n\t\thandlingEvents: events,\n\t}\n}", "title": "" }, { "docid": "4812bc935ccd9b3085cd9f5af3d6b791", "score": "0.4771059", "text": "func (g *grpcserial) generateService(file *generator.FileDescriptor, service *pb.ServiceDescriptorProto, index int) {\n path := fmt.Sprintf(\"6,%d\", index) // 6 means service.\n \n goPackage, _ := goPackageName(file)\n \n origServName := service.GetName()\n fullServName := origServName\n if pkg := file.GetPackage(); pkg != \"\" {\n fullServName = pkg + \".\" + fullServName\n }\n servName := generator.CamelCase(origServName)\n\n g.P(\"/* Example implementation of \", servName, \" service :\")\n g.P()\n g.P(\"package your_package // TODO change to your project package name\")\n g.P()\n g.P(\"import \\\"github.com/golang/protobuf/proto\\\"\")\n g.P(fmt.Sprintf(\"import pb \\\"%s\\\" // TODO change to the Go package in which your .pb.go has been generated\", goPackage))\n g.P()\n g.P(\"// TODO change packagePath value to match your package full import path\")\n g.P(\"//go:generate goprotopy --packagePath=your_org/your_name/your_package $GOFILE\")\n g.P()\n\n for i, method := range service.Method {\n g.gen.PrintComments(fmt.Sprintf(\"%s,2,%d\", path, i)) // 2 means method in a service.\n g.generateSerializedAPI(servName, method)\n }\n g.P(\"*/\")\n g.P()\n}", "title": "" }, { "docid": "9e96172a4b003c1976bfcdda9683bda7", "score": "0.47702298", "text": "func (r *ReconcileTargetEndpoint) newServiceForCR(m *wso2v1alpha2.TargetEndpoint) *corev1.Service {\n\t// set service ports\n\tservicePorts := make([]corev1.ServicePort, 0, len(m.Spec.Ports))\n\tfor _, port := range m.Spec.Ports {\n\t\tservicePorts = append(servicePorts, corev1.ServicePort{\n\t\t\tName: port.Name,\n\t\t\tPort: port.Port,\n\t\t\tTargetPort: intstr.FromInt(int(port.TargetPort)),\n\t\t})\n\t}\n\n\tprotocol := m.Spec.ApplicationProtocol\n\tport := m.Spec.Ports[0].Port\n\ttargetPort := int(m.Spec.Ports[0].TargetPort)\n\n\tswitch protocol {\n\tcase \"https\":\n\t\tif port == 0 {\n\t\t\tport = 443\n\t\t}\n\t\tif targetPort == 0 {\n\t\t\ttargetPort = 443\n\t\t}\n\tcase \"http\":\n\t\tif port == 0 {\n\t\t\tport = 80\n\t\t}\n\t\tif targetPort == 0 {\n\t\t\ttargetPort = 80\n\t\t}\n\t}\n\tservicePorts[0].Port = port\n\tservicePorts[0].TargetPort = intstr.FromInt(targetPort)\n\n\tservice := corev1.Service{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: serviceKind,\n\t\t\tAPIVersion: apiVersion,\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: m.ObjectMeta.Name,\n\t\t\tNamespace: m.ObjectMeta.Namespace,\n\t\t\tLabels: m.Labels,\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tSelector: m.ObjectMeta.Labels,\n\t\t\tPorts: servicePorts,\n\t\t},\n\t}\n\tcontrollerutil.SetControllerReference(m, &service, r.scheme)\n\treturn &service\n}", "title": "" }, { "docid": "a1e217445d260bb47eff793c75ab9849", "score": "0.47682884", "text": "func NewService(ctx *pulumi.Context,\n\tname string, args *ServiceArgs, opts ...pulumi.ResourceOption) (*Service, error) {\n\tif args == nil || args.Service == nil {\n\t\treturn nil, errors.New(\"missing required argument 'Service'\")\n\t}\n\tif args == nil {\n\t\targs = &ServiceArgs{}\n\t}\n\tvar resource Service\n\terr := ctx.RegisterResource(\"gcp:projects/service:Service\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "fd21f7eb91d03017c6faa02fb067a0fa", "score": "0.47681624", "text": "func NewContract() *app.Command {\n\tdesc := \"Create a service contract module.\"\n\tcmd := app.NewCommand(\"contract\", desc, func(ctx *app.Context) error {\n\t\targs := &struct {\n\t\t\tGroup string `option:\"group\"`\n\t\t\tArtifact string `option:\"artifact\"`\n\t\t\tPackage string `option:\"package\"`\n\t\t}{}\n\t\tif err := config.Unmarshal(args); err != nil {\n\t\t\treturn app.Fatal(1, err)\n\t\t}\n\n\t\twd, err := os.Getwd()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"acquire work directory failed: %v\", err)\n\t\t}\n\n\t\t// load parent pom\n\t\tp, err := pom.NewPom(filepath.Join(wd, \"pom.xml\"))\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// check args\n\t\tvar name string\n\t\tif len(ctx.Args()) == 0 {\n\t\t\tif p == nil {\n\t\t\t\treturn fmt.Errorf(\"module name is missing\")\n\t\t\t}\n\t\t\tname = p.GetArtifactID() + \"-service-contract\"\n\t\t} else {\n\t\t\tname = ctx.Args()[0]\n\t\t}\n\n\t\t// build template data\n\t\tif args.Group == \"\" && p != nil {\n\t\t\targs.Group = p.GetGroupID()\n\t\t}\n\t\tif args.Group == \"\" {\n\t\t\treturn fmt.Errorf(\"group arg is missing\")\n\t\t}\n\t\tif args.Artifact == \"\" {\n\t\t\targs.Artifact = name\n\t\t}\n\t\tif args.Package == \"\" {\n\t\t\targs.Package = args.Group + \".\" + strings.Replace(strings.TrimSuffix(args.Artifact, \"-contract\"), \"-\", \".\", -1)\n\t\t}\n\t\tdata := map[string]string{\n\t\t\t\"GroupID\": args.Group,\n\t\t\t\"ArtifactID\": args.Artifact,\n\t\t\t\"Package\": args.Package,\n\t\t}\n\n\t\t// check dir exist\n\t\tmoduleDir := filepath.Join(wd, name)\n\t\t_, err = os.Stat(moduleDir)\n\t\tif err == nil {\n\t\t\treturn fmt.Errorf(\"directory already exist: %v\", moduleDir)\n\t\t}\n\n\t\t// todo: create files\n\t\tfiles := make(map[string]string)\n\t\tfiles[filepath.Join(moduleDir, \"pom.xml\")] = tpl.ContractPomXML\n\t\tfiles[file.NewPath(moduleDir, \"src\", \"main\", \"java\").Join(strings.Split(args.Package, \".\")...).Join(\"constant\", \"TestType.java\").String()] = tpl.TestType\n\t\tfiles[file.NewPath(moduleDir, \"src\", \"main\", \"java\").Join(strings.Split(args.Package, \".\")...).Join(\"dto\", \"TestDto.java\").String()] = tpl.TestDto\n\t\tfiles[file.NewPath(moduleDir, \"src\", \"main\", \"java\").Join(strings.Split(args.Package, \".\")...).Join(\"iface\", \"TestService.java\").String()] = tpl.TestService\n\t\tfiles[file.NewPath(moduleDir, \"src\", \"main\", \"java\").Join(strings.Split(args.Package, \".\")...).Join(\"spring\", \"ServiceAutoConfig.java\").String()] = tpl.ServiceAutoConfig\n\t\tfiles[filepath.Join(moduleDir, \"src\", \"main\", \"resources\", \"META-INF\", \"spring.factories\")] = tpl.SpringFactories\n\t\tfiles[filepath.Join(moduleDir, \"src\", \"main\", \"services\", \"TestService.xml\")] = tpl.TestServiceXML\n\t\tif err = tpl.Execute(files, data); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// modify files\n\t\tif p != nil {\n\t\t\tp.AddModule(args.Artifact)\n\t\t}\n\n\t\tfmt.Println(\"finished.\")\n\t\treturn nil\n\t})\n\tcmd.Flags.Register(flag.Help)\n\tcmd.Flags.String(\"group\", \"g\", \"\", \"group id\")\n\tcmd.Flags.String(\"artifact\", \"a\", \"\", \"artifact id\")\n\tcmd.Flags.String(\"package\", \"p\", \"\", \"package\")\n\treturn cmd\n}", "title": "" }, { "docid": "820be6f9ff44af7b93c2d04ec8e6187e", "score": "0.47676197", "text": "func NewService(\n\tlog *logan.Entry,\n\tconfig Config,\n\thorizon *horizon.Connector,\n\trequestListener RequestListener,\n\trequestPerformer RequestPerformer,\n\tblobSubmitter BlobSubmitter,\n\tusersConnector UsersConnector,\n\taccountsConnector AccountsConnector,\n\tdocumentProvider DocumentsConnector,\n\tidentityMind IdentityMind,\n\tadminNotifyEmails EmailsProcessor,\n) *Service {\n\n\treturn &Service{\n\t\tlog: log.WithField(\"service\", conf.ServiceIdentityMind),\n\t\tconfig: config,\n\n\t\thorizon: horizon,\n\t\trequestListener: requestListener,\n\t\trequestPerformer: requestPerformer,\n\t\tblobSubmitter: blobSubmitter,\n\t\tusersConnector: usersConnector,\n\t\taccountsConnector: accountsConnector,\n\t\tdocumentsConnector: documentProvider,\n\t\tidentityMind: identityMind,\n\t\tadminNotifyEmails: adminNotifyEmails,\n\t}\n}", "title": "" }, { "docid": "7626c03ceff590d73743eab41aecd5cb", "score": "0.4766882", "text": "func RegisterNewService(name string, fn NewServiceFunc) (ServiceID, error) {\n\treturn ServiceFactory.Register(name, fn)\n}", "title": "" }, { "docid": "bea7c0d04991364b00015cecf3be81c1", "score": "0.4758724", "text": "func NewService(r interface{}, bus *microbus.EventBus) Tasks_if.Service {\n\treturn &service{repository: r.(Tasks_if.Repository), moduleBus: bus}\n}", "title": "" }, { "docid": "be815034ab3650ddf50cfb388fb6ee1e", "score": "0.47436982", "text": "func newServiceInfo(port *v1.ServicePort, service *v1.Service, bsvcPortInfo *proxy.BaseServicePortInfo) proxy.ServicePort {\n\tsvcPort := &servicePortInfo{BaseServicePortInfo: bsvcPortInfo}\n\n\t// Store the following for performance reasons.\n\tsvcName := types.NamespacedName{Namespace: service.Namespace, Name: service.Name}\n\tsvcPortName := proxy.ServicePortName{NamespacedName: svcName, Port: port.Name}\n\tprotocol := strings.ToLower(string(svcPort.Protocol()))\n\tsvcPort.nameString = svcPortName.String()\n\tsvcPort.clusterPolicyChainName = servicePortPolicyClusterChain(svcPort.nameString, protocol)\n\tsvcPort.localPolicyChainName = servicePortPolicyLocalChainName(svcPort.nameString, protocol)\n\tsvcPort.firewallChainName = serviceFirewallChainName(svcPort.nameString, protocol)\n\tsvcPort.externalChainName = serviceExternalChainName(svcPort.nameString, protocol)\n\n\treturn svcPort\n}", "title": "" }, { "docid": "80eb77646891e4e83a532c97124a118e", "score": "0.47415057", "text": "func GenerateService(ctx *cli.Context) error {\n\tif ctx.NArg() < 1 {\n\t\treturn errors.New(global.ServiceError)\n\t}\n\n\treturn usecase.GenerateService(ctx.Args().First(), ctx.String(\"a\"), ctx.String(\"d\"))\n}", "title": "" }, { "docid": "61f8ca53c9276553a1a1587a1b92c3ac", "score": "0.47392088", "text": "func NewService(\n\tclusters cluster.Store,\n\tprocesses processService,\n\tlogger logger,\n\tidGenerator idGenerator,\n) Service {\n\tif idGenerator == nil {\n\t\tidGenerator = new(uuidGenerator)\n\t}\n\treturn service{\n\t\tclusters: clusters,\n\t\tprocesses: processes,\n\t\tlogger: logger,\n\t\tidGenerator: idGenerator,\n\t}\n}", "title": "" }, { "docid": "3dece4e2e22b9c481e16f6afb8f9bbe6", "score": "0.47389895", "text": "func NewCRIService(config criconfig.Config, client *containerd.Client) (CRIService, error) {\n\t//var err error\n\tc := &criServiceManager{\n\t\tconfig: config,\n\t\tclient: client,\n\t\tos: osinterface.RealOS{},\n\t\tex: exchange.NewExchange(),\n\t}\n\n\tif client.SnapshotService(c.config.ContainerdConfig.Snapshotter) == nil {\n\t\treturn nil, errors.Errorf(\"failed to find snapshotter %q\", c.config.ContainerdConfig.Snapshotter)\n\t}\n\n\tif runcsystem.RunningInUserNS() {\n\t\tif !(config.DisableCgroup && !c.apparmorEnabled() && config.RestrictOOMScoreAdj) {\n\t\t\tlogrus.Warn(\"Running containerd in a user namespace typically requires disable_cgroup, disable_apparmor, restrict_oom_score_adj set to be true\")\n\t\t}\n\t}\n\n\tif c.config.EnableSelinux {\n\t\tif !selinux.GetEnabled() {\n\t\t\tlogrus.Warn(\"Selinux is not supported\")\n\t\t}\n\t} else {\n\t\tselinux.SetDisabled()\n\t}\n\n\treturn c, nil\n}", "title": "" }, { "docid": "cadba2e196e9d3d581307f9ecf859591", "score": "0.47382104", "text": "func (b *Builder) build() (*service, error) {\n\tif len(b.errors) > 0 {\n\t\treturn nil, patronErrors.Aggregate(b.errors...)\n\t}\n\n\terr := setupJaegerTracing(b.name, b.version)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ts := service{\n\t\tname: b.name,\n\t\tcps: b.cps,\n\t\troutesBuilder: b.routesBuilder,\n\t\tmiddlewares: b.middlewares,\n\t\tacf: b.acf,\n\t\trcf: b.rcf,\n\t\ttermSig: b.termSig,\n\t\tsighupHandler: b.sighupHandler,\n\t\tuncompressedPaths: b.uncompressedPaths,\n\t\thttpRouter: b.httpRouter,\n\t}\n\n\thttpCp, err := s.createHTTPComponent()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ts.cps = append(s.cps, httpCp)\n\ts.setupOSSignal()\n\treturn &s, nil\n}", "title": "" }, { "docid": "d9dba337caba511513bee8209b595473", "score": "0.47376204", "text": "func newServiceAccount(serviceAccountName string, namespace string) *v1.ServiceAccount {\n\treturn &v1.ServiceAccount{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tKind: \"ServiceAccount\",\n\t\t\tAPIVersion: v1.SchemeGroupVersion.String(),\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: serviceAccountName,\n\t\t\tNamespace: namespace,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "7d5d8a07e1ed7d3444293086b4c3a431", "score": "0.47339976", "text": "func NewService(o *ServiceOptions) Service {\n\treturn &service{\n\t\tXmidtWrpURL: o.XmidtWrpURL,\n\t\tWRPSource: o.WRPSource,\n\t\tTr1d1umTransactor: o.Tr1d1umTransactor,\n\t}\n}", "title": "" }, { "docid": "b3396118ebfb6b63c258b9d6d88021d3", "score": "0.47276917", "text": "func (sess *CREDS) launchService(ctx context.Context, taskDefArn string, userName string, hash string, payModel PayModel) (string, error) {\n\tsvc := sess.svc\n\thatchApp := Config.ContainersMap[hash]\n\tcluster, err := sess.findEcsCluster()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tnetworkConfig, err := sess.NetworkConfig(userName)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tloadBalancer, targetGroupArn, _, err := sess.CreateLoadBalancer(userName)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tsvcName := strings.ReplaceAll(os.Getenv(\"GEN3_ENDPOINT\"), \".\", \"-\") + userToResourceName(userName, \"pod\") + \"svc\"\n\tinput := &ecs.CreateServiceInput{\n\t\tDesiredCount: aws.Int64(1),\n\t\tCluster: cluster.ClusterArn,\n\t\tServiceName: aws.String(svcName),\n\t\tTaskDefinition: &taskDefArn,\n\t\tNetworkConfiguration: &networkConfig,\n\t\tDeploymentConfiguration: &ecs.DeploymentConfiguration{\n\t\t\tMinimumHealthyPercent: aws.Int64(0),\n\t\t},\n\t\tEnableECSManagedTags: aws.Bool(true),\n\t\tLaunchType: aws.String(\"FARGATE\"),\n\t\tLoadBalancers: []*ecs.LoadBalancer{\n\t\t\t{\n\t\t\t\tContainerName: aws.String(userToResourceName(userName, \"pod\")),\n\t\t\t\tContainerPort: aws.Int64(int64(hatchApp.TargetPort)),\n\t\t\t\tTargetGroupArn: targetGroupArn,\n\t\t\t},\n\t\t},\n\t}\n\n\tresult, err := svc.CreateService(input)\n\tif err != nil {\n\t\tif aerr, ok := err.(awserr.Error); ok {\n\t\t\tswitch aerr.Code() {\n\t\t\tcase ecs.ErrCodeInvalidParameterException:\n\t\t\t\tif aerr.Error() == \"InvalidParameterException: Creation of service was not idempotent.\" {\n\t\t\t\t\tConfig.Logger.Print(\"Service already exists.. \")\n\t\t\t\t\treturn \"\", nil\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tConfig.Logger.Println(err.Error())\n\t\treturn \"\", err\n\t}\n\tConfig.Logger.Printf(\"Service launched: %s\", *result.Service.ClusterArn)\n\terr = createLocalService(ctx, userName, hash, *loadBalancer.LoadBalancers[0].DNSName, payModel)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn *loadBalancer.LoadBalancers[0].DNSName, nil\n}", "title": "" }, { "docid": "6d23c4b0f0d0754dfae89f3d3fad20e3", "score": "0.47182164", "text": "func startService(port string) *goserve.Service {\n\n\ttlsEnabled := common.TLS_ENABLED\n\tmInfo := make(map[string]interface{})\n\tmInfo[\"SERVICE_VERSION\"] = common.SERVICE_VERSION\n\tcert := viper.GetString(\"cert_file\")\n\tkey := viper.GetString(\"key_file\")\n\tr := chi.NewRouter()\n\n\tcustomService := goserve.GetService(r, port, cert, key, tlsEnabled, mInfo)\n\treturn customService\n}", "title": "" }, { "docid": "4d43c770c428626be11d9d3acc97858b", "score": "0.47083095", "text": "func (vm *windows) createService(svc *service) error {\n\tif svc == nil {\n\t\treturn errors.New(\"service object should not be nil\")\n\t}\n\tsvcCreateCmd := fmt.Sprintf(\"sc.exe create %s binPath=\\\"%s %s\\\" start=auto\", svc.name, svc.binaryPath,\n\t\tsvc.args)\n\tif len(svc.dependencies) > 0 {\n\t\tdependencyList := strings.Join(svc.dependencies, \"/\")\n\t\tsvcCreateCmd += \" depend=\" + dependencyList\n\t}\n\n\t_, err := vm.Run(svcCreateCmd, false)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed to create service %s\", svc.name)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1be4859fcc7ef92c7f40017386bb2f56", "score": "0.4707925", "text": "func NewService(config ServiceConfig) (*Service, error) {\n\tnewService := &Service{\n\t\t// Internals.\n\t\tcloser: make(chan struct{}, 1),\n\t\tbootOnce: sync.Once{},\n\t\tshutdownOnce: sync.Once{},\n\t}\n\n\treturn newService, nil\n}", "title": "" }, { "docid": "ca6e8dba5b0f14560ae6c0ada532efc7", "score": "0.4702493", "text": "func buildAndStart(c *cli.Context, service *services.Service) (bool, error) {\n\tcmd := exec.Command(service.BinPath)\n\n\trebuilt, err := installService(service)\n\tif err != nil {\n\t\treturn rebuilt, err\n\t}\n\n\toutputFile, err := os.Create(service.LogFilePath)\n\tif err != nil && os.IsNotExist(err) {\n\t\treturn rebuilt, err\n\t}\n\tdefer outputFile.Close()\n\tpidFile, err := os.Create(service.PidFilePath)\n\tif err != nil && os.IsNotExist(err) {\n\t\treturn rebuilt, err\n\t}\n\tdefer pidFile.Close()\n\tcmd.Stdout = outputFile\n\tcmd.Stderr = outputFile\n\tcmd.Env = GetEnvForService(c, service)\n\n\tif !c.Bool(\"attach\") {\n\t\tcmd.SysProcAttr = &syscall.SysProcAttr{Setpgid: true}\n\t}\n\n\tif err := cmd.Start(); err != nil {\n\t\treturn rebuilt, err\n\t}\n\tpidFile.WriteString(strconv.Itoa(cmd.Process.Pid))\n\ttime.Sleep(200 * time.Millisecond)\n\tif !service.IsRunning() {\n\t\treturn rebuilt, fmt.Errorf(\"Service %s exited after %s\", cmd.ProcessState.UserTime().String())\n\t}\n\treturn rebuilt, nil\n}", "title": "" }, { "docid": "361ead572e8d2e95a5425a035191877e", "score": "0.46954444", "text": "func NewService(services map[string][]*interop.Service, sink *receiver.TestCoordinatorSink) *ServiceImpl {\n\treqs := testdata.LoadTestSuites()\n\ttests := map[int64]*interop.TestRequest{}\n\tfor _, req := range reqs {\n\t\ttests[req.Id] = req\n\t}\n\treturn &ServiceImpl{registeredServices: services, sink: sink, testSuites: tests}\n}", "title": "" }, { "docid": "79c539aa12b8fa9c25d313e826363a72", "score": "0.46900797", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t\tmutex: &sync.RWMutex{},\n\t\tregistry: make(map[string]*Meta),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "e7afef048d080ef96e4094cf54762c5e", "score": "0.46874288", "text": "func CreateService(c []string) {\n\tif len(c) < 1 {\n\t\tfmt.Println(\"gfalcon-cli create [target] [args...]\")\n\t\treturn\n\n\t}\n\tserviceID := c[0]\n\n\tfmt.Println(model.CreateService(db, serviceID))\n\n}", "title": "" }, { "docid": "864bbfb1946ffd299e36357b7f5516ea", "score": "0.46787804", "text": "func (ig *irpc) generateService(file *generator.FileDescriptor, service *pb.ServiceDescriptorProto, index int) {\n\tpath := fmt.Sprintf(\"6,%d\", index) // 6 means service.\n\n\torigServName := service.GetName()\n\tfullServName := origServName\n\tif pkg := file.GetPackage(); pkg != \"\" {\n\t\tfullServName = pkg + \".\" + fullServName\n\t}\n\tservName := generator.CamelCase(origServName)\n\n\tig.P()\n\tig.P(\"// Client API for \", servName, \" service\")\n\tig.P(\"// iceberg server version,relation to server uri.\")\n\tif pkg := file.GetOptions().GetGoPackage(); strings.ToLower(pkg) == \"v2\" {\n\t\tig.P(\"var \", unexport(origServName)+\"Version = frame.SrvVersionName[frame.SV2]\")\n\t} else {\n\t\tig.P(\"var \", unexport(origServName)+\"Version = frame.SrvVersionName[frame.SV1]\")\n\t}\n\n\tig.P()\n\tsrvVersion := unexport(origServName) + \"Version\"\n\t// Client interface.\n\tfor i, method := range service.Method {\n\t\tif !ig.gen.PrintComments(fmt.Sprintf(\"%s,2,%d\", path, i)) {\n\t\t\tig.P()\n\t\t} // 2 means method in a service.\n\n\t\tig.P(\"func \", ig.generateClientSignature(servName, method), \" {\")\n\t\tig.P(\"task, err := frame.ReadyTask(ctx, \", strconv.Quote(strings.ToLower(method.GetName())), \", \", strconv.Quote(strings.ToLower(servName)), \", \", srvVersion, \" ,in ,opts...)\")\n\n\t\tig.P(\"if err != nil {\")\n\t\tig.P(\"\treturn nil, err\")\n\t\tig.P(\"}\")\n\n\t\tig.P(\"back, err := frame.DeliverTo(task)\")\n\t\tig.P(\"if err != nil {\")\n\t\tig.P(\"\treturn nil, err\")\n\t\tig.P(\"}\")\n\n\t\tig.P()\n\t\tig.P(\"var out \", ig.typeName(method.GetOutputType()))\n\t\tig.P(\"if err := protocol.Unpack(back.GetFormat(), back.GetBody(), &out); err != nil {\")\n\t\tig.P(\"\treturn nil, err\")\n\t\tig.P(\"}\")\n\t\tig.P(\"return &out, nil\")\n\t\tig.P(\"}\")\n\t}\n\n\t// Server interface\n\tig.P(\"// \", servName, \"Server Server API for Hello service\")\n\tig.P(\"type \", servName, \"Server interface{\")\n\tfor _, method := range service.Method {\n\t\tig.P()\n\t\tig.P(ig.generateServerSignature(servName, method))\n\t\tig.P()\n\t}\n\tig.P(\"}\")\n\n\tig.P(\"// Register\", servName, \"Server register \", servName, \"Server with etcd info\")\n\tig.P(\"func Register\", servName, \"Server(srv \", servName, \"Server, cfg *config.BaseCfg) {\")\n\tig.P(\"frame.RegisterAndServe(&\", unexport(servName), \"ServerDesc, srv, cfg)\")\n\tig.P(\"}\")\n\n\tfor _, method := range service.Method {\n\t\tig.P(\"// \", unexport(servName), \" server \", generator.CamelCase(method.GetName()), \" handler\")\n\t\tig.P(\"func \", unexport(servName), method.GetName(), \"Handler(srv interface{}, ctx frame.Context) error {\")\n\t\tig.P(\"return srv.(\", servName, \"Server).\", generator.CamelCase(method.GetName()), \"(ctx)\")\n\t\tig.P(\"}\")\n\t}\n\n\tig.P(\"// \", unexport(servName), \" server describe\")\n\n\tig.P(\"var \", unexport(servName), \"ServerDesc = frame.ServiceDesc {\")\n\tig.P(\"Version:\", unexport(origServName), \"Version,\")\n\tig.P(\"ServiceName:\", strconv.Quote(servName), \",\")\n\tig.P(\"HandlerType:\", \"(*\", servName, \"Server)(nil),\")\n\tig.P(\"Methods: []frame.MethodDesc{\")\n\n\tfor _, method := range service.Method {\n\t\tig.P(\"{\")\n\t\tif method.GetClientStreaming() && !method.GetServerStreaming() { // 第三方调用我方接口\n\t\t\tig.P(\"A: \", \"frame.Openapi\", \",\")\n\t\t} else if method.GetClientStreaming() && method.GetServerStreaming() { // 只能Iceberg体系的服务间相互调用\n\t\t\tig.P(\"A: \", \"frame.Stream\", \",\")\n\t\t} else if !method.GetClientStreaming() && method.GetServerStreaming() { // OM后台调用\n\t\t\tig.P(\"A: \", \"frame.Internal\", \",\")\n\t\t} else {\n\t\t\tig.P(\"A: \", \"frame.App\", \",\") // APP调用\n\t\t}\n\t\t//ig.P(\"MethodName: \", strconv.Quote(strings.ToLower(method.GetName())), \",\")\n\t\tig.P(\"MethodName: \", strconv.Quote(strings.ToLower(func(name string) string {\n\t\t\tvar s string\n\t\t\tfor index, r := range name {\n\t\t\t\tif index > 0 && unicode.IsUpper(r) {\n\t\t\t\t\ts += \"/\" + string(r)\n\t\t\t\t} else {\n\t\t\t\t\ts += string(r)\n\t\t\t\t}\n\t\t\t}\n\n\t\t\treturn s\n\t\t}(method.GetName()))), \",\")\n\t\tig.P(\"Handler: \", unexport(servName)+method.GetName()+\"Handler,\")\n\t\tig.P(\"},\")\n\t}\n\n\tig.P(\"},\")\n\tig.P(\"ServiceURI: []string{\")\n\n\tig.P(strconv.Quote(\"/services/\"), \" + \", unexport(origServName), \"Version + \", strconv.Quote(\"/\"+toLower(servName)), \",\")\n\tig.P(\"},\")\n\n\tig.P(\"Metadata: \", strconv.Quote(fullServName), \",\")\n\tig.P(\"}\")\n}", "title": "" }, { "docid": "b2b85ba335a0c9069f3847902598bea0", "score": "0.4676836", "text": "func NewLaunchService(client *graphql.Client) LaunchServer {\n\treturn LaunchServer{\n\t\tgraphqlClient: client,\n\t}\n}", "title": "" }, { "docid": "eca4f8b28b584e68ff2b7e6c1b2c64ba", "score": "0.46746537", "text": "func NewService(port domain.IPort) *Service {\n\treturn &Service{\n\t\tport: port,\n\t}\n}", "title": "" }, { "docid": "027d480df289998f2676f93cf9092006", "score": "0.46731085", "text": "func NewService(sling *sling.Sling, uriTemplate string) *Service {\n\treturn &Service{\n\t\tCanDeleteService: services.CanDeleteService{\n\t\t\tService: services.NewService(constants.ServiceGitCredentialService, sling, uriTemplate),\n\t\t},\n\t}\n}", "title": "" }, { "docid": "14e90378a2df96e169295ba116ba9b13", "score": "0.46730492", "text": "func SetupService(\n\tWriteService services.WriteService,\n\tReadService services.ReadService,\n\tallocator asfservices.IntPoolAllocator,\n) (services.Service, error) {\n\treactions, err := dependencies.ParseReactions(\n\t\t[]byte(logic.ReactionsYAML),\n\t\t\"intent-compiler\",\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlogicService := logic.NewService(\n\t\tWriteService,\n\t\tReadService,\n\t\tallocator,\n\t\tintent.NewCache(),\n\t\tdependencies.NewDependencyProcessor(reactions),\n\t)\n\n\treturn logicService, nil\n}", "title": "" }, { "docid": "35c27779a37f2d73bfc92e32f11ec511", "score": "0.4666124", "text": "func (cl *servingClient) ConstructService(name, image, serviceAccount, namespace string) *serving_v1_api.Service {\n\n\tservice := serving_v1_api.Service{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: name,\n\t\t\tNamespace: namespace,\n\t\t},\n\t\tSpec: serving_v1_api.ServiceSpec{\n\t\t\tConfigurationSpec: serving_v1_api.ConfigurationSpec{\n\t\t\t\tTemplate: serving_v1_api.RevisionTemplateSpec{\n\t\t\t\t\tSpec: serving_v1_api.RevisionSpec{\n\t\t\t\t\t\tPodSpec: v1.PodSpec{\n\t\t\t\t\t\t\tServiceAccountName: serviceAccount,\n\t\t\t\t\t\t\tContainers: []v1.Container{\n\t\t\t\t\t\t\t\t{\n\t\t\t\t\t\t\t\t\tImage: image,\n\t\t\t\t\t\t\t\t},\n\t\t\t\t\t\t\t},\n\t\t\t\t\t\t},\n\t\t\t\t\t},\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t}\n\n\treturn &service\n}", "title": "" }, { "docid": "50d25ed00575242cd2962ee78468fdd0", "score": "0.46616036", "text": "func BuildingStartupService(srv *mservice.Service, conf *config.Options) {\n\n\tc := dig.New()\n\n\t//data(database/cache) context\n\tbuildDataContext(c, conf)\n\n\t//service : aggregate repository service and logic proc to provide service ability for handler\n\tc.Provide(service.NewUser)\n\tc.Provide(service.NewRole)\n\tc.Provide(service.NewResource)\n\n\t// begin to handle service object instance\n\tc.Invoke(func(sc *serviceCollection) {\n\n\t\tif sc == nil {\n\t\t\tlogger.Warnf(\"no service got in DI Container\")\n\t\t}\n\n\t\tsrv.Handle(handler.NewRBAC(srv, sc.userService, sc.roleService, sc.resourceService))\n\t\t// handle user\n\t\tsrv.Handle(handler.NewUser(srv, sc.userService))\n\t\t// handle role\n\t\tsrv.Handle(handler.NewRole(srv, sc.roleService))\n\t\t// handle resource\n\t\tsrv.Handle(handler.NewResource(srv, sc.resourceService))\n\n\t})\n\n}", "title": "" }, { "docid": "44cf7f97e89227661f4ddd6e417d1966", "score": "0.4660985", "text": "func newServiceDeployer(api *API, env map[string]string, options ...DeployServiceOption) *serviceDeployer {\n\td := &serviceDeployer{\n\t\tapi: api,\n\t\tenv: env,\n\t}\n\tfor _, option := range options {\n\t\toption(d)\n\t}\n\treturn d\n}", "title": "" }, { "docid": "3cbfed583db094d0e9d3425c5edb7181", "score": "0.46556538", "text": "func NewService(repo RepositoryInterface, claGroupRepository projects_cla_groups.Repository) Service {\n\treturn service{\n\t\trepo: repo,\n\t\tclaGroupRepository: claGroupRepository,\n\t}\n}", "title": "" }, { "docid": "c7de6cf61c03a0b734e9fda900b623c5", "score": "0.4649354", "text": "func newConmonOCIRuntime(name string, paths []string, conmonPath string, runtimeFlags []string, runtimeCfg *config.Config) (OCIRuntime, error) {\n\treturn nil, errors.New(\"newConmonOCIRuntime not supported on this platform\")\n}", "title": "" }, { "docid": "96259c0eed5a83b35ac56f68c4bfc908", "score": "0.46489364", "text": "func New(c *conf.Config) (s *Service) {\n\ts = &Service{\n\t\tc: c,\n\t\tcpm: cpm.New(c),\n\t\tabtest: abtest.New(c),\n\t\tres: resource.New(c),\n\t\tads: ads.New(c),\n\t\talarmDao: alarm.New(c),\n\t\tshow: show.New(c),\n\t\tmanager: manager.New(c),\n\t\tlocationRPC: locrpc.New(c.LocationRPC),\n\t\tresCacheMap: make(map[int]*model.Resource),\n\t\tasgCacheMap: make(map[int][]*model.Assignment),\n\t\tvideoAdsAPPCache: make(map[int8]map[int8]map[int8]map[string]*model.VideoAD),\n\t\tmissch: make(chan interface{}, 10240),\n\t\ttypeList: make(map[string]string),\n\t\tresArchiveWarnCache: make(map[int64][]*model.ResWarnInfo),\n\t\tresURLWarnCache: make(map[string][]*model.ResWarnInfo),\n\t\tbannerHashCache: make(map[int8]string),\n\t\tindexIcon: make(map[int][]*model.IndexIcon),\n\t\tbannerCache: make(map[int8]map[int][]*model.Banner),\n\t\tcategoryBannerCache: make(map[int8]map[int][]*model.Banner),\n\t\tposCache: make(map[int][]int),\n\t\tcardCache: make(map[int8]*model.Head),\n\t\tcmtbox: make(map[int64]*model.Cmtbox),\n\t\tsideBarLimitCache: make(map[int64][]*model.SideBarLimit),\n\t\tabTestCache: make(map[string]*model.AbTest),\n\t\tarcRPC: arcrpc.New2(c.ArchiveRPC),\n\t\tarchiveSub: databus.New(c.ArchiveSub),\n\t\tspecialCache: make(map[int64]*pb.SpecialReply),\n\t\trelateCache: make(map[int64]*model.Relate),\n\t\trelatePgcMapCache: make(map[int64]int64),\n\t\tauditCache: make(map[string][]int),\n\t}\n\tif err := s.loadRes(); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := s.loadVideoAds(); err != nil {\n\t\tpanic(err)\n\t}\n\tif err := s.loadBannerCahce(); err != nil {\n\t\tpanic(err)\n\t}\n\ts.loadTypeList()\n\ts.loadPlayIcon()\n\ts.loadCmtbox()\n\ts.loadSpecialCache()\n\ts.loadRelateCache()\n\ts.loadAudit()\n\tgo s.loadproc()\n\tgo s.loadCmtboxproc()\n\tgo s.loadCardCache()\n\tgo s.loadSideBarCache()\n\tgo s.cacheproc()\n\tif s.c.MonitorArchive {\n\t\ts.waiter.Add(1)\n\t\tgo s.arcConsume()\n\t}\n\tif s.c.MonitorURL {\n\t\tgo s.checkResURL()\n\t}\n\treturn\n}", "title": "" }, { "docid": "fd24408bc7e89822ebdcaf3436115c61", "score": "0.46489167", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n\n}", "title": "" }, { "docid": "c627212190e57ee644dee2cab19dd631", "score": "0.4646968", "text": "func NewCommandService(OnRefresh func()) *CommandService {\n\treturn &CommandService{\n\t\tOnRefresh: OnRefresh,\n\t}\n}", "title": "" }, { "docid": "babced0fa67fc4fa415d53b61c002e98", "score": "0.46427992", "text": "func NewService(providerType string, identifier string) *Service {\n\treturn &Service{\n\t\tType: providerType,\n\t\tIdentifier: identifier,\n\t}\n}", "title": "" }, { "docid": "3d6c1b2826918215e645202c8a1a1f85", "score": "0.46421686", "text": "func (f *Factory) Make(name string, settings map[string]interface{}) (registry.Service, error) {\n\tflogoActivityService := &FlogoActivity{}\n\treq := FlogoActivityRequest{}\n\treq.Inputs = make(map[string]interface{})\n\tflogoActivityService.Request = req\n\terr := flogoActivityService.setRequestValues(settings)\n\treturn flogoActivityService, err\n}", "title": "" }, { "docid": "e8eca0bb6f6706f994fde9b5f2dacd76", "score": "0.46420845", "text": "func newJobsService(sling *sling.Sling) *JobsService {\n\treturn &JobsService{\n\t\tsling.Path(ChronosAPIJobs),\n\t}\n}", "title": "" }, { "docid": "b927f1c82fd3d0db50977e0eb130b111", "score": "0.46398398", "text": "func NewService(config Config) Verification {\n\treturn service{\n\t\tconfig: config,\n\t}\n}", "title": "" }, { "docid": "310f7d976975d0295d9daed5b8b74d0a", "score": "0.46377498", "text": "func NewCmdServiceCreate(name, fullName string) *cobra.Command {\n\to := NewServiceCreateOptions()\n\tserviceCreateCmd := &cobra.Command{\n\t\tUse: name + \" <service_type> --plan <plan_name> [service_name]\",\n\t\tShort: createShortDesc,\n\t\tLong: createLongDesc,\n\t\tExample: fmt.Sprintf(createExample, fullName),\n\t\tArgs: cobra.RangeArgs(1, 2),\n\t\tRun: func(cmd *cobra.Command, args []string) {\n\t\t\tutil.CheckError(o.Complete(name, cmd, args), \"\")\n\t\t\tutil.CheckError(o.Validate(), \"\")\n\t\t\tutil.CheckError(o.Run(), \"\")\n\t\t},\n\t}\n\tserviceCreateCmd.Flags().StringVar(&o.plan, \"plan\", \"\", \"The name of the plan of the service to be created\")\n\tserviceCreateCmd.Flags().StringSliceVarP(&o.parameters, \"parameters\", \"p\", []string{}, \"Parameters of the plan where a parameter is expressed as <key>=<value\")\n\tcompletion.RegisterCommandHandler(serviceCreateCmd, completion.ServiceClassCompletionHandler)\n\treturn serviceCreateCmd\n}", "title": "" }, { "docid": "1517254db233b0835354571b49b3248a", "score": "0.46319187", "text": "func generateServiceAction(method ServiceMethod, objects map[string]RamlType) (code *jen.Statement) {\n\tmethodParamList := []jen.Code{\n\t\tjen.Id(\"ctx\").Qual(\"context\", \"Context\"),\n\t}\n\textraParams := generateServiceArgumentCode(method)\n\tmethodParamList = append(methodParamList, extraParams...)\n\tif method.InputType != \"\" {\n\t\tmethodParamList = append(methodParamList, jen.Id(\"value\").Op(\"*\").Id(method.InputType))\n\t}\n\tmethodParamList = append(methodParamList, jen.Id(\"opts\").Op(\"...\").Id(\"RequestOption\"))\n\n\tvar clientMethod string\n\tswitch method.HTTPMethod {\n\tcase \"post\":\n\t\tclientMethod = \"create\"\n\tcase \"get\":\n\t\tclientMethod = \"get\"\n\t}\n\n\tstructReceiver := jen.Id(\"client\").Op(\"*\").Id(\"Client\")\n\tdescription := fmt.Sprintf(\"for type %s\", method.InputType)\n\tif method.Description != \"\" {\n\t\tdescription = method.Description\n\t}\n\n\tif method.ReturnType == \"\" {\n\t\tlog.Fatalf(\"Empty return type for %s\", method.Name)\n\t}\n\n\treturnObject := objects[method.ReturnType]\n\treturnParams := createServiceReturnList(method, returnObject)\n\n\t// Generate the `type <resource>Input struct {}`\n\tc := jen.Empty()\n\tif len(method.QueryParameters) > 0 {\n\t\tc.Commentf(\"%s is input for function %s\", method.InputType, method.Name).Line()\n\t\tc.Type().Id(method.InputType).StructFunc(func(d *jen.Group) {\n\t\t\tfor _, param := range method.QueryParameters {\n\n\t\t\t\tline := jen.Empty()\n\n\t\t\t\tline.Id(param.CodeName)\n\t\t\t\ttypeCode := getNativeTypeCode(param)\n\n\t\t\t\tif param.ItemsObject != nil {\n\t\t\t\t\tline.Map(jen.String()).Add(typeCode)\n\t\t\t\t} else if param.Many {\n\t\t\t\t\tline.Index().Add(typeCode)\n\t\t\t\t} else {\n\t\t\t\t\tline.Add(typeCode)\n\t\t\t\t}\n\n\t\t\t\t// Generate the url tag\n\t\t\t\turlTags := []string{param.Name}\n\t\t\t\tif param.Optional || param.TypeName == \"boolean\" {\n\t\t\t\t\turlTags = append(urlTags, \"omitempty\")\n\t\t\t\t}\n\t\t\t\ttagVal := map[string]string{\"url\": strings.Join(urlTags, \",\")}\n\t\t\t\tline.Tag(tagVal)\n\n\t\t\t\td.Add(line)\n\t\t\t}\n\t\t}).Line()\n\n\t}\n\n\tc.Commentf(\"%s %s\", method.Name, description).Line()\n\tc.Func().Params(structReceiver).Id(method.Name).Params(jen.List(methodParamList...)).Parens(returnParams).BlockFunc(func(b *jen.Group) {\n\n\t\t// params := url.Values{} | SerializeQueryParams(value)\n\t\t// for _, opt := range opts {\n\t\t// \topt(&params)\n\t\t// }\n\t\tif len(method.QueryParameters) > 0 {\n\t\t\tb.Id(\"params\").Op(\":=\").Id(\"serializeQueryParams\").Call(jen.Id(\"value\"))\n\t\t} else {\n\t\t\tb.Id(\"params\").Op(\":=\").Qual(\"net/url\", \"Values\").Block()\n\t\t}\n\n\t\tb.For(jen.List(jen.Id(\"_\"), jen.Id(\"opt\")).Op(\":=\").Range().Id(\"opts\")).Block(\n\t\t\tjen.Id(\"opt\").Call(jen.Op(\"&\").Id(\"params\")),\n\t\t).Line()\n\n\t\tb.Id(\"endpoint\").Op(\":=\").Add(generateServicePathCode(method))\n\n\t\tb.Id(\"err\").Op(\"=\").Id(\"client\").Op(\".\").Id(clientMethod).CallFunc(func(g *jen.Group) {\n\t\t\tg.Id(\"ctx\")\n\t\t\tg.Id(\"endpoint\")\n\t\t\tg.Id(\"params\")\n\n\t\t\tif method.HTTPMethod == \"post\" {\n\t\t\t\tif method.InputType != \"\" {\n\t\t\t\t\tg.Id(\"value\")\n\t\t\t\t} else {\n\t\t\t\t\tg.Nil()\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tg.Op(\"&\").Id(\"result\")\n\t\t})\n\t\tb.If(jen.Err().Op(\"!=\").Nil()).Block(\n\t\t\tjen.Return(jen.Nil(), jen.Err()),\n\t\t)\n\t\tb.Return(jen.Id(\"result\"), jen.Nil())\n\t}).Line()\n\n\treturn c\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.46312228", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "246a6fa74a9644bc6a1fd565e2b30cf4", "score": "0.46312228", "text": "func New() endly.Service {\n\tvar result = &service{\n\t\tAbstractService: endly.NewAbstractService(ServiceID),\n\t}\n\tresult.AbstractService.Service = result\n\tresult.registerRoutes()\n\treturn result\n}", "title": "" }, { "docid": "7db8e351b924c33f625d75a5aca1da00", "score": "0.4624593", "text": "func NewService(sshClient ssh.Interface, scope scope.KKInstanceScope, instanceScope *scope.InstanceScope) Service {\n\tswitch instanceScope.ContainerManager().Type {\n\tcase file.ContainerdID:\n\t\treturn NewContainerdService(sshClient, scope, instanceScope)\n\tcase file.DockerID:\n\t\treturn NewDockerService(sshClient, scope, instanceScope)\n\tdefault:\n\t\treturn NewContainerdService(sshClient, scope, instanceScope)\n\t}\n}", "title": "" }, { "docid": "daa8236a3cca1f912aec3f7024e12878", "score": "0.46144772", "text": "func newPingServiceForCR(cr *brokerv1alpha1.ActiveMQArtemis) *corev1.Service {\n\n\t// Log where we are and what we're doing\n\t//reqLogger := log.WithValues(\"ActiveMQArtemis Name\", cr.Name)\n\t//reqLogger.Info(\"Creating new \" + name_suffix + \" service\")\n\n\tlabels := selectors.LabelsForActiveMQArtemis(cr.Name)\n\n\tport := corev1.ServicePort{\n\t\tProtocol: \"TCP\",\n\t\tPort: 8888,\n\t\tTargetPort: intstr.FromInt(int(8888)),\n\t}\n\tports := []corev1.ServicePort{}\n\tports = append(ports, port)\n\n\tsvc := &corev1.Service{\n\t\tTypeMeta: metav1.TypeMeta{\n\t\t\tAPIVersion: \"v1\",\n\t\t\tKind: \"Service\",\n\t\t},\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tAnnotations: nil,\n\t\t\tLabels: labels,\n\t\t\tName: \"ping\",\n\t\t\tNamespace: cr.Namespace,\n\t\t},\n\t\tSpec: corev1.ServiceSpec{\n\t\t\tType: \"ClusterIP\",\n\t\t\tPorts: ports,\n\t\t\tSelector: labels,\n\t\t\tClusterIP: \"None\",\n\t\t\tPublishNotReadyAddresses: true,\n\t\t},\n\t}\n\n\treturn svc\n}", "title": "" } ]
e4cbddcb2168f824d6038b8aaafeb252
Raw returns the raw expression string before conversion into Reverse Polish notation. Validation of a raw expression is not confirmed until it is compiled.
[ { "docid": "bf1280734077f261f69085ba20ed7063", "score": "0.7121323", "text": "func (e *Expr) Raw() string {\n\treturn e.raw\n}", "title": "" } ]
[ { "docid": "1c0a5aecc1826d7d793612fc9f3172a0", "score": "0.6883958", "text": "func Raw(raw string, parent ...Expression) Expression {\n\trawExp := &rawExpression{Raw: raw}\n\trawExp.ExpressionInterfaceImpl.Parent = OptionalOrDefaultExpression(rawExp, parent...)\n\n\treturn rawExp\n}", "title": "" }, { "docid": "81bd615bac1ddb7c0f2e627ce8510d4d", "score": "0.6557895", "text": "func raw(s string) RawString {\n\treturn RawString(s)\n}", "title": "" }, { "docid": "df5399d071041ff8fef618394d889e25", "score": "0.6424025", "text": "func (arguments *Arguments) Raw() string {\n\treturn arguments.raw\n}", "title": "" }, { "docid": "6fd7b50e692a6f49eec6e0921d2261b3", "score": "0.6295594", "text": "func Raw(value string) stmt.Raw {\n\treturn stmt.NewRaw(value)\n}", "title": "" }, { "docid": "d7c16a7653d3412a715d945d5d8e9c3d", "score": "0.59647226", "text": "func Raw(fragment string, v ...interface{}) Condition {\n\treturn Condition{\n\t\tCQLFragment: fragment,\n\t\tValues: v,\n\t}\n}", "title": "" }, { "docid": "da983dab76d586cdfda8d02b2e0b23e9", "score": "0.5934185", "text": "func (s *Stmt) Raw() string {\n\treturn s.query\n}", "title": "" }, { "docid": "af4a70da2675dfb636d396a5a14bee01", "score": "0.5933519", "text": "func (argument *Argument) Raw() string {\n\treturn argument.raw\n}", "title": "" }, { "docid": "168395ce5f8c413f3442ca3d66065955", "score": "0.5914618", "text": "func Raw(value string, args ...interface{}) RawValue {\n\tr := rawValue{v: value, a: nil}\n\tif len(args) > 0 {\n\t\tr.a = &args\n\t}\n\treturn r\n}", "title": "" }, { "docid": "28a3e72f856d3fd70b2c78e57f2a53de", "score": "0.5914094", "text": "func (v *Value) Raw() (string, error) {\n\tif v.val == nil {\n\t\treturn \"\", ErrNotExist\n\t}\n\treturn v.raw, nil\n}", "title": "" }, { "docid": "5cfc6f193315d17de457fb9379e3b05d", "score": "0.59127927", "text": "func (n Node) Raw() string {\n\tif n := n.get(); n != nil {\n\t\treturn n.raw\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "10ebe4c94ebb92a4dec2422214c1fa6f", "score": "0.589489", "text": "func Raw(cmd string, options ...types.Option) (string, error) {\n\treturn command(cmd, options...)\n}", "title": "" }, { "docid": "63fa3f25c93e2dd04d1d21f9265047c9", "score": "0.5869209", "text": "func (d *Dispenser) ValRaw() string {\n\tif d.cursor < 0 || d.cursor >= len(d.tokens) {\n\t\treturn \"\"\n\t}\n\tquote := d.tokens[d.cursor].wasQuoted\n\tif quote > 0 && quote != '<' {\n\t\t// string literal\n\t\treturn string(quote) + d.tokens[d.cursor].Text + string(quote)\n\t}\n\treturn d.tokens[d.cursor].Text\n}", "title": "" }, { "docid": "d40d5318561067292a1a4aae0838d834", "score": "0.5788931", "text": "func (t Token) RawString() string {\n\treturn string(t.raw)\n}", "title": "" }, { "docid": "39e1c5e063754129738fb602bfe0fead", "score": "0.57695425", "text": "func (t Toks) Raw() string {\n\treturn t.raw\n}", "title": "" }, { "docid": "6c2491d296855e94cda02357a4c4b186", "score": "0.5744604", "text": "func Raw(b []byte) Value {\n\treturn RawValue(b)\n}", "title": "" }, { "docid": "33f3eac57f8b09f44c693da4e45a65f9", "score": "0.57084143", "text": "func (e *EnvString) RawString() string {\n\treturn string(*e)\n}", "title": "" }, { "docid": "793574559fc007dc4cf7fc95f97ae4c1", "score": "0.56773955", "text": "func (t Token) Raw() []byte {\n\treturn t.raw\n}", "title": "" }, { "docid": "e70c28470a47accec2b85989cff36ed0", "score": "0.56481725", "text": "func (r Rule) RawPattern() string {\n\treturn r.pattern.pattern\n}", "title": "" }, { "docid": "febf9a8532203d139566d5727aa9ff50", "score": "0.5590383", "text": "func (p *PartialGenerator) Raw() *jen.Statement {\n\treturn p.raw\n}", "title": "" }, { "docid": "a7b4e51fd7d3a781e429d534d6a4b50a", "score": "0.55501634", "text": "func (v Value) RawString() string {\n\tx, ok := v.data.(string)\n\tif !ok {\n\t\treturn \"\"\n\t}\n\treturn x\n}", "title": "" }, { "docid": "db35514be92b5c724b92e2a80cead140", "score": "0.5518085", "text": "func Raw(v ...interface{}) {\n\t_ = Use(\"default\").WriteString(fmt.Sprint(v...))\n}", "title": "" }, { "docid": "87f29fe7fc685890b55b1b6afb1ac911", "score": "0.5512957", "text": "func (attr *Attribute) Raw() string {\n\tlis := make([]string, len(attr.rows))\n\tfor i, row := range attr.rows {\n\t\tlis[i] = row.String()\n\t}\n\n\treturn strings.Join(lis, \"\\n\")\n}", "title": "" }, { "docid": "02a0404ff0d4be3faa81fa8a58758794", "score": "0.5505937", "text": "func (conn *Conn) Raw(rawline string) {\n\t// Avoid command injection by enforcing one command per line.\n\tconn.out <- cutNewLines(rawline)\n}", "title": "" }, { "docid": "8fb305ca94cc320295326effc8fe938c", "score": "0.54565156", "text": "func (n NoteOn) Raw() []byte {\n\treturn channelMessage2(n.channel, 9, n.key, n.velocity)\n}", "title": "" }, { "docid": "553a46233314dd08c264deb284c7edbc", "score": "0.54161656", "text": "func Raw(args ...string) ([]byte, error) {\n\treturn exec.Command(path, args...).Output()\n}", "title": "" }, { "docid": "4c492f25263597de3a316f8c0b07736d", "score": "0.53866446", "text": "func (restic *Restic) Raw(profile *ProfileConfiguration, command string, arguments []string) (string, error) {\n\n\tglog.Infof(\"Performing %s %v on repo %v\", command, arguments, profile.Repository())\n\tstdout, stderr, err := restic.execute(command, arguments, profile)\n\n\tif err != nil {\n\t\treturn stdout, errors.New(stderr)\n\t}\n\n\treturn stdout, nil\n}", "title": "" }, { "docid": "4a939224b332569fed95348dcee20e5b", "score": "0.5351583", "text": "func Raw(on bool) {\n\tif on {\n\t\tC.raw()\n\t\treturn\n\t}\n\tC.noraw()\n}", "title": "" }, { "docid": "840b213a9c92f4cfc326a76bbfa54bce", "score": "0.5351123", "text": "func (_e *ConditionEvaluatorMock_Expecter) EvaluateRaw(ctx interface{}, now interface{}) *ConditionEvaluatorMock_EvaluateRaw_Call {\n\treturn &ConditionEvaluatorMock_EvaluateRaw_Call{Call: _e.mock.On(\"EvaluateRaw\", ctx, now)}\n}", "title": "" }, { "docid": "c05fa7c91e3f1493c7679fb93ab40d2e", "score": "0.5338575", "text": "func ParseRaw(statement string) (quad.Quad, error) {\n\tdata := []rune(statement)\n\n\tvar (\n\t\tcs, p int\n\t\tpe = len(data)\n\t\teof = pe\n\n\t\tsubject = -1\n\t\tpredicate = -1\n\t\tobject = -1\n\t\tlabel = -1\n\n\t\tisEscaped bool\n\n\t\tq quad.Quad\n\t)\n\n\t// line 63 \"raw.go\"\n\t{\n\t\tcs = raw_start\n\t}\n\n\t// line 141 \"raw.rl\"\n\n\t// line 71 \"raw.go\"\n\t{\n\t\tif p == pe {\n\t\t\tgoto _test_eof\n\t\t}\n\t\tswitch cs {\n\t\tcase 1:\n\t\t\tgoto st_case_1\n\t\tcase 0:\n\t\t\tgoto st_case_0\n\t\tcase 2:\n\t\t\tgoto st_case_2\n\t\tcase 3:\n\t\t\tgoto st_case_3\n\t\tcase 4:\n\t\t\tgoto st_case_4\n\t\tcase 5:\n\t\t\tgoto st_case_5\n\t\tcase 6:\n\t\t\tgoto st_case_6\n\t\tcase 7:\n\t\t\tgoto st_case_7\n\t\tcase 8:\n\t\t\tgoto st_case_8\n\t\tcase 9:\n\t\t\tgoto st_case_9\n\t\tcase 10:\n\t\t\tgoto st_case_10\n\t\tcase 88:\n\t\t\tgoto st_case_88\n\t\tcase 89:\n\t\t\tgoto st_case_89\n\t\tcase 11:\n\t\t\tgoto st_case_11\n\t\tcase 12:\n\t\t\tgoto st_case_12\n\t\tcase 13:\n\t\t\tgoto st_case_13\n\t\tcase 14:\n\t\t\tgoto st_case_14\n\t\tcase 15:\n\t\t\tgoto st_case_15\n\t\tcase 16:\n\t\t\tgoto st_case_16\n\t\tcase 17:\n\t\t\tgoto st_case_17\n\t\tcase 18:\n\t\t\tgoto st_case_18\n\t\tcase 19:\n\t\t\tgoto st_case_19\n\t\tcase 20:\n\t\t\tgoto st_case_20\n\t\tcase 21:\n\t\t\tgoto st_case_21\n\t\tcase 22:\n\t\t\tgoto st_case_22\n\t\tcase 23:\n\t\t\tgoto st_case_23\n\t\tcase 24:\n\t\t\tgoto st_case_24\n\t\tcase 25:\n\t\t\tgoto st_case_25\n\t\tcase 26:\n\t\t\tgoto st_case_26\n\t\tcase 90:\n\t\t\tgoto st_case_90\n\t\tcase 27:\n\t\t\tgoto st_case_27\n\t\tcase 28:\n\t\t\tgoto st_case_28\n\t\tcase 29:\n\t\t\tgoto st_case_29\n\t\tcase 30:\n\t\t\tgoto st_case_30\n\t\tcase 31:\n\t\t\tgoto st_case_31\n\t\tcase 32:\n\t\t\tgoto st_case_32\n\t\tcase 33:\n\t\t\tgoto st_case_33\n\t\tcase 34:\n\t\t\tgoto st_case_34\n\t\tcase 35:\n\t\t\tgoto st_case_35\n\t\tcase 36:\n\t\t\tgoto st_case_36\n\t\tcase 37:\n\t\t\tgoto st_case_37\n\t\tcase 38:\n\t\t\tgoto st_case_38\n\t\tcase 39:\n\t\t\tgoto st_case_39\n\t\tcase 40:\n\t\t\tgoto st_case_40\n\t\tcase 41:\n\t\t\tgoto st_case_41\n\t\tcase 42:\n\t\t\tgoto st_case_42\n\t\tcase 43:\n\t\t\tgoto st_case_43\n\t\tcase 44:\n\t\t\tgoto st_case_44\n\t\tcase 45:\n\t\t\tgoto st_case_45\n\t\tcase 46:\n\t\t\tgoto st_case_46\n\t\tcase 47:\n\t\t\tgoto st_case_47\n\t\tcase 48:\n\t\t\tgoto st_case_48\n\t\tcase 49:\n\t\t\tgoto st_case_49\n\t\tcase 50:\n\t\t\tgoto st_case_50\n\t\tcase 51:\n\t\t\tgoto st_case_51\n\t\tcase 52:\n\t\t\tgoto st_case_52\n\t\tcase 53:\n\t\t\tgoto st_case_53\n\t\tcase 54:\n\t\t\tgoto st_case_54\n\t\tcase 55:\n\t\t\tgoto st_case_55\n\t\tcase 56:\n\t\t\tgoto st_case_56\n\t\tcase 57:\n\t\t\tgoto st_case_57\n\t\tcase 58:\n\t\t\tgoto st_case_58\n\t\tcase 91:\n\t\t\tgoto st_case_91\n\t\tcase 59:\n\t\t\tgoto st_case_59\n\t\tcase 60:\n\t\t\tgoto st_case_60\n\t\tcase 61:\n\t\t\tgoto st_case_61\n\t\tcase 62:\n\t\t\tgoto st_case_62\n\t\tcase 92:\n\t\t\tgoto st_case_92\n\t\tcase 63:\n\t\t\tgoto st_case_63\n\t\tcase 64:\n\t\t\tgoto st_case_64\n\t\tcase 65:\n\t\t\tgoto st_case_65\n\t\tcase 66:\n\t\t\tgoto st_case_66\n\t\tcase 67:\n\t\t\tgoto st_case_67\n\t\tcase 68:\n\t\t\tgoto st_case_68\n\t\tcase 69:\n\t\t\tgoto st_case_69\n\t\tcase 70:\n\t\t\tgoto st_case_70\n\t\tcase 71:\n\t\t\tgoto st_case_71\n\t\tcase 72:\n\t\t\tgoto st_case_72\n\t\tcase 73:\n\t\t\tgoto st_case_73\n\t\tcase 74:\n\t\t\tgoto st_case_74\n\t\tcase 75:\n\t\t\tgoto st_case_75\n\t\tcase 76:\n\t\t\tgoto st_case_76\n\t\tcase 77:\n\t\t\tgoto st_case_77\n\t\tcase 78:\n\t\t\tgoto st_case_78\n\t\tcase 79:\n\t\t\tgoto st_case_79\n\t\tcase 80:\n\t\t\tgoto st_case_80\n\t\tcase 81:\n\t\t\tgoto st_case_81\n\t\tcase 82:\n\t\t\tgoto st_case_82\n\t\tcase 83:\n\t\t\tgoto st_case_83\n\t\tcase 84:\n\t\t\tgoto st_case_84\n\t\tcase 85:\n\t\t\tgoto st_case_85\n\t\tcase 86:\n\t\t\tgoto st_case_86\n\t\tcase 87:\n\t\t\tgoto st_case_87\n\t\t}\n\t\tgoto st_out\n\tst1:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof1\n\t\t}\n\tst_case_1:\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st1\n\t\tcase 32:\n\t\t\tgoto st1\n\t\tcase 60:\n\t\t\tgoto tr2\n\t\tcase 95:\n\t\t\tgoto tr3\n\t\t}\n\t\tgoto tr0\n\ttr0:\n\t\t// line 88 \"raw.rl\"\n\n\t\tif p < len(data) {\n\t\t\tif r := data[p]; r < unicode.MaxASCII {\n\t\t\t\treturn q, fmt.Errorf(\"%v: unexpected rune %q at %d\", quad.ErrInvalid, data[p], p)\n\t\t\t} else {\n\t\t\t\treturn q, fmt.Errorf(\"%v: unexpected rune %q (\\\\u%04x) at %d\", quad.ErrInvalid, data[p], data[p], p)\n\t\t\t}\n\t\t}\n\t\treturn q, quad.ErrIncomplete\n\n\t\tgoto st0\n\t\t// line 295 \"raw.go\"\n\tst_case_0:\n\tst0:\n\t\tcs = 0\n\t\tgoto _out\n\ttr2:\n\t\t// line 33 \"raw.rl\"\n\n\t\tsubject = p\n\n\t\tgoto st2\n\ttr120:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st2\n\tst2:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof2\n\t\t}\n\tst_case_2:\n\t\t// line 319 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 33:\n\t\t\tgoto st2\n\t\tcase 62:\n\t\t\tgoto st3\n\t\tcase 92:\n\t\t\tgoto st74\n\t\tcase 95:\n\t\t\tgoto st2\n\t\tcase 126:\n\t\t\tgoto st2\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 61:\n\t\t\tif 35 <= data[p] && data[p] <= 59 {\n\t\t\t\tgoto st2\n\t\t\t}\n\t\tcase data[p] > 93:\n\t\t\tswitch {\n\t\t\tcase data[p] > 122:\n\t\t\t\tif 128 <= data[p] && data[p] <= 1114111 {\n\t\t\t\t\tgoto st2\n\t\t\t\t}\n\t\t\tcase data[p] >= 97:\n\t\t\t\tgoto st2\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st2\n\t\t}\n\t\tgoto tr0\n\ttr121:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st3\n\tst3:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof3\n\t\t}\n\tst_case_3:\n\t\t// line 362 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr7\n\t\tcase 32:\n\t\t\tgoto tr7\n\t\tcase 60:\n\t\t\tgoto tr8\n\t\t}\n\t\tgoto tr0\n\ttr7:\n\t\t// line 49 \"raw.rl\"\n\n\t\tif subject < 0 {\n\t\t\tpanic(\"unexpected parser state: subject start not set\")\n\t\t}\n\t\tq.Subject = unEscapeRaw(data[subject:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st4\n\tst4:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof4\n\t\t}\n\tst_case_4:\n\t\t// line 388 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st4\n\t\tcase 32:\n\t\t\tgoto st4\n\t\tcase 60:\n\t\t\tgoto tr10\n\t\t}\n\t\tgoto tr0\n\ttr8:\n\t\t// line 49 \"raw.rl\"\n\n\t\tif subject < 0 {\n\t\t\tpanic(\"unexpected parser state: subject start not set\")\n\t\t}\n\t\tq.Subject = unEscapeRaw(data[subject:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 37 \"raw.rl\"\n\n\t\tpredicate = p\n\n\t\tgoto st5\n\ttr10:\n\t\t// line 37 \"raw.rl\"\n\n\t\tpredicate = p\n\n\t\tgoto st5\n\ttr108:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st5\n\tst5:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof5\n\t\t}\n\tst_case_5:\n\t\t// line 433 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 33:\n\t\t\tgoto st5\n\t\tcase 62:\n\t\t\tgoto st6\n\t\tcase 92:\n\t\t\tgoto st64\n\t\tcase 95:\n\t\t\tgoto st5\n\t\tcase 126:\n\t\t\tgoto st5\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 61:\n\t\t\tif 35 <= data[p] && data[p] <= 59 {\n\t\t\t\tgoto st5\n\t\t\t}\n\t\tcase data[p] > 93:\n\t\t\tswitch {\n\t\t\tcase data[p] > 122:\n\t\t\t\tif 128 <= data[p] && data[p] <= 1114111 {\n\t\t\t\t\tgoto st5\n\t\t\t\t}\n\t\t\tcase data[p] >= 97:\n\t\t\t\tgoto st5\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st5\n\t\t}\n\t\tgoto tr0\n\ttr109:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st6\n\tst6:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof6\n\t\t}\n\tst_case_6:\n\t\t// line 476 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr14\n\t\tcase 32:\n\t\t\tgoto tr14\n\t\tcase 34:\n\t\t\tgoto tr15\n\t\tcase 60:\n\t\t\tgoto tr16\n\t\tcase 95:\n\t\t\tgoto tr17\n\t\t}\n\t\tgoto tr0\n\ttr14:\n\t\t// line 57 \"raw.rl\"\n\n\t\tif predicate < 0 {\n\t\t\tpanic(\"unexpected parser state: predicate start not set\")\n\t\t}\n\t\tq.Predicate = unEscapeRaw(data[predicate:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st7\n\tst7:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof7\n\t\t}\n\tst_case_7:\n\t\t// line 506 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st7\n\t\tcase 32:\n\t\t\tgoto st7\n\t\tcase 34:\n\t\t\tgoto tr19\n\t\tcase 60:\n\t\t\tgoto tr20\n\t\tcase 95:\n\t\t\tgoto tr21\n\t\t}\n\t\tgoto tr0\n\ttr15:\n\t\t// line 57 \"raw.rl\"\n\n\t\tif predicate < 0 {\n\t\t\tpanic(\"unexpected parser state: predicate start not set\")\n\t\t}\n\t\tq.Predicate = unEscapeRaw(data[predicate:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 41 \"raw.rl\"\n\n\t\tobject = p\n\n\t\tgoto st8\n\ttr19:\n\t\t// line 41 \"raw.rl\"\n\n\t\tobject = p\n\n\t\tgoto st8\n\ttr79:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st8\n\tst8:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof8\n\t\t}\n\tst_case_8:\n\t\t// line 555 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 34:\n\t\t\tgoto st9\n\t\tcase 92:\n\t\t\tgoto st46\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 11:\n\t\t\tif 0 <= data[p] && data[p] <= 9 {\n\t\t\t\tgoto st8\n\t\t\t}\n\t\tcase data[p] > 12:\n\t\t\tif 14 <= data[p] && data[p] <= 1114111 {\n\t\t\t\tgoto st8\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st8\n\t\t}\n\t\tgoto tr0\n\ttr80:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st9\n\tst9:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof9\n\t\t}\n\tst_case_9:\n\t\t// line 587 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr25\n\t\tcase 32:\n\t\t\tgoto tr25\n\t\tcase 46:\n\t\t\tgoto tr26\n\t\tcase 60:\n\t\t\tgoto tr27\n\t\tcase 64:\n\t\t\tgoto st28\n\t\tcase 94:\n\t\t\tgoto st32\n\t\tcase 95:\n\t\t\tgoto tr30\n\t\t}\n\t\tgoto tr0\n\ttr25:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st10\n\ttr96:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 73 \"raw.rl\"\n\n\t\tif label < 0 {\n\t\t\tpanic(\"unexpected parser state: label start not set\")\n\t\t}\n\t\tq.Label = unEscapeRaw(data[label:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st10\n\tst10:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof10\n\t\t}\n\tst_case_10:\n\t\t// line 641 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st10\n\t\tcase 32:\n\t\t\tgoto st10\n\t\tcase 46:\n\t\t\tgoto st88\n\t\tcase 60:\n\t\t\tgoto tr33\n\t\tcase 95:\n\t\t\tgoto tr34\n\t\t}\n\t\tgoto tr0\n\ttr26:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st88\n\ttr39:\n\t\t// line 73 \"raw.rl\"\n\n\t\tif label < 0 {\n\t\t\tpanic(\"unexpected parser state: label start not set\")\n\t\t}\n\t\tq.Label = unEscapeRaw(data[label:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st88\n\tst88:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof88\n\t\t}\n\tst_case_88:\n\t\t// line 682 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st88\n\t\tcase 32:\n\t\t\tgoto st88\n\t\tcase 35:\n\t\t\tgoto tr127\n\t\t}\n\t\tgoto st0\n\ttr127:\n\t\t// line 85 \"raw.rl\"\n\n\t\tgoto st89\n\tst89:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof89\n\t\t}\n\tst_case_89:\n\t\t// line 703 \"raw.go\"\n\t\tgoto st89\n\ttr27:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 45 \"raw.rl\"\n\n\t\tlabel = p\n\n\t\tgoto st11\n\ttr33:\n\t\t// line 45 \"raw.rl\"\n\n\t\tlabel = p\n\n\t\tgoto st11\n\ttr50:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st11\n\tst11:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof11\n\t\t}\n\tst_case_11:\n\t\t// line 740 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 33:\n\t\t\tgoto st11\n\t\tcase 62:\n\t\t\tgoto st12\n\t\tcase 92:\n\t\t\tgoto st14\n\t\tcase 95:\n\t\t\tgoto st11\n\t\tcase 126:\n\t\t\tgoto st11\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 61:\n\t\t\tif 35 <= data[p] && data[p] <= 59 {\n\t\t\t\tgoto st11\n\t\t\t}\n\t\tcase data[p] > 93:\n\t\t\tswitch {\n\t\t\tcase data[p] > 122:\n\t\t\t\tif 128 <= data[p] && data[p] <= 1114111 {\n\t\t\t\t\tgoto st11\n\t\t\t\t}\n\t\t\tcase data[p] >= 97:\n\t\t\t\tgoto st11\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st11\n\t\t}\n\t\tgoto tr0\n\ttr51:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st12\n\tst12:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof12\n\t\t}\n\tst_case_12:\n\t\t// line 783 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr38\n\t\tcase 32:\n\t\t\tgoto tr38\n\t\tcase 46:\n\t\t\tgoto tr39\n\t\t}\n\t\tgoto tr0\n\ttr38:\n\t\t// line 73 \"raw.rl\"\n\n\t\tif label < 0 {\n\t\t\tpanic(\"unexpected parser state: label start not set\")\n\t\t}\n\t\tq.Label = unEscapeRaw(data[label:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st13\n\tst13:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof13\n\t\t}\n\tst_case_13:\n\t\t// line 809 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st13\n\t\tcase 32:\n\t\t\tgoto st13\n\t\tcase 46:\n\t\t\tgoto st88\n\t\t}\n\t\tgoto tr0\n\ttr52:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st14\n\tst14:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof14\n\t\t}\n\tst_case_14:\n\t\t// line 831 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 85:\n\t\t\tgoto st15\n\t\tcase 117:\n\t\t\tgoto st19\n\t\t}\n\t\tgoto tr0\n\tst15:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof15\n\t\t}\n\tst_case_15:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st16\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st16\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st16\n\t\t}\n\t\tgoto tr0\n\tst16:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof16\n\t\t}\n\tst_case_16:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st17\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st17\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st17\n\t\t}\n\t\tgoto tr0\n\tst17:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof17\n\t\t}\n\tst_case_17:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st18\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st18\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st18\n\t\t}\n\t\tgoto tr0\n\tst18:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof18\n\t\t}\n\tst_case_18:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st19\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st19\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st19\n\t\t}\n\t\tgoto tr0\n\tst19:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof19\n\t\t}\n\tst_case_19:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st20\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st20\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st20\n\t\t}\n\t\tgoto tr0\n\tst20:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof20\n\t\t}\n\tst_case_20:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st21\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st21\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st21\n\t\t}\n\t\tgoto tr0\n\tst21:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof21\n\t\t}\n\tst_case_21:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st22\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st22\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st22\n\t\t}\n\t\tgoto tr0\n\tst22:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof22\n\t\t}\n\tst_case_22:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st23\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st23\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st23\n\t\t}\n\t\tgoto tr0\n\tst23:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof23\n\t\t}\n\tst_case_23:\n\t\tswitch data[p] {\n\t\tcase 33:\n\t\t\tgoto tr50\n\t\tcase 62:\n\t\t\tgoto tr51\n\t\tcase 92:\n\t\t\tgoto tr52\n\t\tcase 95:\n\t\t\tgoto tr50\n\t\tcase 126:\n\t\t\tgoto tr50\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 61:\n\t\t\tif 35 <= data[p] && data[p] <= 59 {\n\t\t\t\tgoto tr50\n\t\t\t}\n\t\tcase data[p] > 93:\n\t\t\tswitch {\n\t\t\tcase data[p] > 122:\n\t\t\t\tif 128 <= data[p] && data[p] <= 1114111 {\n\t\t\t\t\tgoto tr50\n\t\t\t\t}\n\t\t\tcase data[p] >= 97:\n\t\t\t\tgoto tr50\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto tr50\n\t\t}\n\t\tgoto tr0\n\ttr30:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 45 \"raw.rl\"\n\n\t\tlabel = p\n\n\t\tgoto st24\n\ttr34:\n\t\t// line 45 \"raw.rl\"\n\n\t\tlabel = p\n\n\t\tgoto st24\n\tst24:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof24\n\t\t}\n\tst_case_24:\n\t\t// line 1046 \"raw.go\"\n\t\tif data[p] == 58 {\n\t\t\tgoto st25\n\t\t}\n\t\tgoto tr0\n\tst25:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof25\n\t\t}\n\tst_case_25:\n\t\tif data[p] == 95 {\n\t\t\tgoto st26\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 895:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 767:\n\t\t\t\t\tif 880 <= data[p] && data[p] <= 893 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st26\n\t\t\t}\n\t\tcase data[p] > 8191:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8204 <= data[p] && data[p] <= 8205 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st26\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st26\n\t\t}\n\t\tgoto tr0\n\tst26:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof26\n\t\t}\n\tst_case_26:\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr38\n\t\tcase 32:\n\t\t\tgoto tr38\n\t\tcase 45:\n\t\t\tgoto st26\n\t\tcase 46:\n\t\t\tgoto tr55\n\t\tcase 95:\n\t\t\tgoto st26\n\t\tcase 183:\n\t\t\tgoto st26\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st26\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st26\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st26\n\t\t}\n\t\tgoto tr0\n\ttr55:\n\t\t// line 73 \"raw.rl\"\n\n\t\tif label < 0 {\n\t\t\tpanic(\"unexpected parser state: label start not set\")\n\t\t}\n\t\tq.Label = unEscapeRaw(data[label:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st90\n\tst90:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof90\n\t\t}\n\tst_case_90:\n\t\t// line 1228 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st88\n\t\tcase 32:\n\t\t\tgoto st88\n\t\tcase 35:\n\t\t\tgoto tr127\n\t\tcase 45:\n\t\t\tgoto st26\n\t\tcase 46:\n\t\t\tgoto st27\n\t\tcase 95:\n\t\t\tgoto st26\n\t\tcase 183:\n\t\t\tgoto st26\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st26\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st26\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st26\n\t\t}\n\t\tgoto st0\n\tst27:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof27\n\t\t}\n\tst_case_27:\n\t\tswitch data[p] {\n\t\tcase 45:\n\t\t\tgoto st26\n\t\tcase 46:\n\t\t\tgoto st27\n\t\tcase 95:\n\t\t\tgoto st26\n\t\tcase 183:\n\t\t\tgoto st26\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st26\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st26\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st26\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st26\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st26\n\t\t}\n\t\tgoto tr0\n\tst28:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof28\n\t\t}\n\tst_case_28:\n\t\tswitch {\n\t\tcase data[p] > 90:\n\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\tgoto st29\n\t\t\t}\n\t\tcase data[p] >= 65:\n\t\t\tgoto st29\n\t\t}\n\t\tgoto tr0\n\tst29:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof29\n\t\t}\n\tst_case_29:\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr25\n\t\tcase 32:\n\t\t\tgoto tr25\n\t\tcase 45:\n\t\t\tgoto st30\n\t\tcase 46:\n\t\t\tgoto tr26\n\t\tcase 60:\n\t\t\tgoto tr27\n\t\tcase 95:\n\t\t\tgoto tr30\n\t\t}\n\t\tswitch {\n\t\tcase data[p] > 90:\n\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\tgoto st29\n\t\t\t}\n\t\tcase data[p] >= 65:\n\t\t\tgoto st29\n\t\t}\n\t\tgoto tr0\n\tst30:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof30\n\t\t}\n\tst_case_30:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st31\n\t\t\t}\n\t\tcase data[p] > 90:\n\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\tgoto st31\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st31\n\t\t}\n\t\tgoto tr0\n\tst31:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof31\n\t\t}\n\tst_case_31:\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr25\n\t\tcase 32:\n\t\t\tgoto tr25\n\t\tcase 45:\n\t\t\tgoto st30\n\t\tcase 46:\n\t\t\tgoto tr26\n\t\tcase 60:\n\t\t\tgoto tr27\n\t\tcase 95:\n\t\t\tgoto tr30\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st31\n\t\t\t}\n\t\tcase data[p] > 90:\n\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\tgoto st31\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st31\n\t\t}\n\t\tgoto tr0\n\tst32:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof32\n\t\t}\n\tst_case_32:\n\t\tif data[p] == 94 {\n\t\t\tgoto st33\n\t\t}\n\t\tgoto tr0\n\tst33:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof33\n\t\t}\n\tst_case_33:\n\t\tif data[p] == 60 {\n\t\t\tgoto st34\n\t\t}\n\t\tgoto tr0\n\ttr16:\n\t\t// line 57 \"raw.rl\"\n\n\t\tif predicate < 0 {\n\t\t\tpanic(\"unexpected parser state: predicate start not set\")\n\t\t}\n\t\tq.Predicate = unEscapeRaw(data[predicate:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 41 \"raw.rl\"\n\n\t\tobject = p\n\n\t\tgoto st34\n\ttr20:\n\t\t// line 41 \"raw.rl\"\n\n\t\tobject = p\n\n\t\tgoto st34\n\ttr73:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st34\n\tst34:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof34\n\t\t}\n\tst_case_34:\n\t\t// line 1539 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 33:\n\t\t\tgoto st34\n\t\tcase 62:\n\t\t\tgoto st35\n\t\tcase 92:\n\t\t\tgoto st36\n\t\tcase 95:\n\t\t\tgoto st34\n\t\tcase 126:\n\t\t\tgoto st34\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 61:\n\t\t\tif 35 <= data[p] && data[p] <= 59 {\n\t\t\t\tgoto st34\n\t\t\t}\n\t\tcase data[p] > 93:\n\t\t\tswitch {\n\t\t\tcase data[p] > 122:\n\t\t\t\tif 128 <= data[p] && data[p] <= 1114111 {\n\t\t\t\t\tgoto st34\n\t\t\t\t}\n\t\t\tcase data[p] >= 97:\n\t\t\t\tgoto st34\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st34\n\t\t}\n\t\tgoto tr0\n\ttr74:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st35\n\tst35:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof35\n\t\t}\n\tst_case_35:\n\t\t// line 1582 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr25\n\t\tcase 32:\n\t\t\tgoto tr25\n\t\tcase 46:\n\t\t\tgoto tr26\n\t\tcase 60:\n\t\t\tgoto tr27\n\t\tcase 95:\n\t\t\tgoto tr30\n\t\t}\n\t\tgoto tr0\n\ttr75:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st36\n\tst36:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof36\n\t\t}\n\tst_case_36:\n\t\t// line 1608 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 85:\n\t\t\tgoto st37\n\t\tcase 117:\n\t\t\tgoto st41\n\t\t}\n\t\tgoto tr0\n\tst37:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof37\n\t\t}\n\tst_case_37:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st38\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st38\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st38\n\t\t}\n\t\tgoto tr0\n\tst38:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof38\n\t\t}\n\tst_case_38:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st39\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st39\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st39\n\t\t}\n\t\tgoto tr0\n\tst39:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof39\n\t\t}\n\tst_case_39:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st40\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st40\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st40\n\t\t}\n\t\tgoto tr0\n\tst40:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof40\n\t\t}\n\tst_case_40:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st41\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st41\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st41\n\t\t}\n\t\tgoto tr0\n\tst41:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof41\n\t\t}\n\tst_case_41:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st42\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st42\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st42\n\t\t}\n\t\tgoto tr0\n\tst42:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof42\n\t\t}\n\tst_case_42:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st43\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st43\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st43\n\t\t}\n\t\tgoto tr0\n\tst43:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof43\n\t\t}\n\tst_case_43:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st44\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st44\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st44\n\t\t}\n\t\tgoto tr0\n\tst44:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof44\n\t\t}\n\tst_case_44:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st45\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st45\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st45\n\t\t}\n\t\tgoto tr0\n\tst45:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof45\n\t\t}\n\tst_case_45:\n\t\tswitch data[p] {\n\t\tcase 33:\n\t\t\tgoto tr73\n\t\tcase 62:\n\t\t\tgoto tr74\n\t\tcase 92:\n\t\t\tgoto tr75\n\t\tcase 95:\n\t\t\tgoto tr73\n\t\tcase 126:\n\t\t\tgoto tr73\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 61:\n\t\t\tif 35 <= data[p] && data[p] <= 59 {\n\t\t\t\tgoto tr73\n\t\t\t}\n\t\tcase data[p] > 93:\n\t\t\tswitch {\n\t\t\tcase data[p] > 122:\n\t\t\t\tif 128 <= data[p] && data[p] <= 1114111 {\n\t\t\t\t\tgoto tr73\n\t\t\t\t}\n\t\t\tcase data[p] >= 97:\n\t\t\t\tgoto tr73\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto tr73\n\t\t}\n\t\tgoto tr0\n\ttr81:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st46\n\tst46:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof46\n\t\t}\n\tst_case_46:\n\t\t// line 1807 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 34:\n\t\t\tgoto st47\n\t\tcase 39:\n\t\t\tgoto st47\n\t\tcase 85:\n\t\t\tgoto st48\n\t\tcase 92:\n\t\t\tgoto st47\n\t\tcase 98:\n\t\t\tgoto st47\n\t\tcase 102:\n\t\t\tgoto st47\n\t\tcase 110:\n\t\t\tgoto st47\n\t\tcase 114:\n\t\t\tgoto st47\n\t\tcase 116:\n\t\t\tgoto st47\n\t\tcase 117:\n\t\t\tgoto st52\n\t\t}\n\t\tgoto tr0\n\tst47:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof47\n\t\t}\n\tst_case_47:\n\t\tswitch data[p] {\n\t\tcase 34:\n\t\t\tgoto tr80\n\t\tcase 92:\n\t\t\tgoto tr81\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 11:\n\t\t\tif 0 <= data[p] && data[p] <= 9 {\n\t\t\t\tgoto tr79\n\t\t\t}\n\t\tcase data[p] > 12:\n\t\t\tif 14 <= data[p] && data[p] <= 1114111 {\n\t\t\t\tgoto tr79\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto tr79\n\t\t}\n\t\tgoto tr0\n\tst48:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof48\n\t\t}\n\tst_case_48:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st49\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st49\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st49\n\t\t}\n\t\tgoto tr0\n\tst49:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof49\n\t\t}\n\tst_case_49:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st50\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st50\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st50\n\t\t}\n\t\tgoto tr0\n\tst50:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof50\n\t\t}\n\tst_case_50:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st51\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st51\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st51\n\t\t}\n\t\tgoto tr0\n\tst51:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof51\n\t\t}\n\tst_case_51:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st52\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st52\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st52\n\t\t}\n\t\tgoto tr0\n\tst52:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof52\n\t\t}\n\tst_case_52:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st53\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st53\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st53\n\t\t}\n\t\tgoto tr0\n\tst53:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof53\n\t\t}\n\tst_case_53:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st54\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st54\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st54\n\t\t}\n\t\tgoto tr0\n\tst54:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof54\n\t\t}\n\tst_case_54:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st55\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st55\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st55\n\t\t}\n\t\tgoto tr0\n\tst55:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof55\n\t\t}\n\tst_case_55:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st47\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st47\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st47\n\t\t}\n\t\tgoto tr0\n\ttr17:\n\t\t// line 57 \"raw.rl\"\n\n\t\tif predicate < 0 {\n\t\t\tpanic(\"unexpected parser state: predicate start not set\")\n\t\t}\n\t\tq.Predicate = unEscapeRaw(data[predicate:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 41 \"raw.rl\"\n\n\t\tobject = p\n\n\t\tgoto st56\n\ttr21:\n\t\t// line 41 \"raw.rl\"\n\n\t\tobject = p\n\n\t\tgoto st56\n\tst56:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof56\n\t\t}\n\tst_case_56:\n\t\t// line 2027 \"raw.go\"\n\t\tif data[p] == 58 {\n\t\t\tgoto st57\n\t\t}\n\t\tgoto tr0\n\tst57:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof57\n\t\t}\n\tst_case_57:\n\t\tif data[p] == 95 {\n\t\t\tgoto st58\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 895:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 767:\n\t\t\t\t\tif 880 <= data[p] && data[p] <= 893 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tcase data[p] > 8191:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8204 <= data[p] && data[p] <= 8205 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st58\n\t\t}\n\t\tgoto tr0\n\tst58:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof58\n\t\t}\n\tst_case_58:\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr25\n\t\tcase 32:\n\t\t\tgoto tr25\n\t\tcase 45:\n\t\t\tgoto st58\n\t\tcase 46:\n\t\t\tgoto tr90\n\t\tcase 60:\n\t\t\tgoto tr27\n\t\tcase 95:\n\t\t\tgoto tr91\n\t\tcase 183:\n\t\t\tgoto st58\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st58\n\t\t}\n\t\tgoto tr0\n\ttr90:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st91\n\tst91:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof91\n\t\t}\n\tst_case_91:\n\t\t// line 2211 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st88\n\t\tcase 32:\n\t\t\tgoto st88\n\t\tcase 35:\n\t\t\tgoto tr127\n\t\tcase 45:\n\t\t\tgoto st58\n\t\tcase 46:\n\t\t\tgoto st59\n\t\tcase 95:\n\t\t\tgoto st58\n\t\tcase 183:\n\t\t\tgoto st58\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st58\n\t\t}\n\t\tgoto st0\n\tst59:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof59\n\t\t}\n\tst_case_59:\n\t\tswitch data[p] {\n\t\tcase 45:\n\t\t\tgoto st58\n\t\tcase 46:\n\t\t\tgoto st59\n\t\tcase 95:\n\t\t\tgoto st58\n\t\tcase 183:\n\t\t\tgoto st58\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st58\n\t\t}\n\t\tgoto tr0\n\ttr91:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 45 \"raw.rl\"\n\n\t\tlabel = p\n\n\t\tgoto st60\n\tst60:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof60\n\t\t}\n\tst_case_60:\n\t\t// line 2398 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr25\n\t\tcase 32:\n\t\t\tgoto tr25\n\t\tcase 45:\n\t\t\tgoto st58\n\t\tcase 46:\n\t\t\tgoto tr90\n\t\tcase 58:\n\t\t\tgoto st61\n\t\tcase 60:\n\t\t\tgoto tr27\n\t\tcase 95:\n\t\t\tgoto tr91\n\t\tcase 183:\n\t\t\tgoto st58\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st58\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st58\n\t\t}\n\t\tgoto tr0\n\tst61:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof61\n\t\t}\n\tst_case_61:\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr25\n\t\tcase 32:\n\t\t\tgoto tr25\n\t\tcase 45:\n\t\t\tgoto st58\n\t\tcase 46:\n\t\t\tgoto tr90\n\t\tcase 60:\n\t\t\tgoto tr27\n\t\tcase 95:\n\t\t\tgoto tr95\n\t\tcase 183:\n\t\t\tgoto st58\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 895:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 767:\n\t\t\t\t\tswitch {\n\t\t\t\t\tcase data[p] > 879:\n\t\t\t\t\t\tif 880 <= data[p] && data[p] <= 893 {\n\t\t\t\t\t\t\tgoto st62\n\t\t\t\t\t\t}\n\t\t\t\t\tcase data[p] >= 768:\n\t\t\t\t\t\tgoto st58\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st62\n\t\t\t}\n\t\tcase data[p] > 8191:\n\t\t\tswitch {\n\t\t\tcase data[p] < 11264:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8255:\n\t\t\t\t\tif 8204 <= data[p] && data[p] <= 8205 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8256:\n\t\t\t\t\tif 8304 <= data[p] && data[p] <= 8591 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st58\n\t\t\t\t}\n\t\t\tcase data[p] > 12271:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 63744:\n\t\t\t\t\tif 12289 <= data[p] && data[p] <= 55295 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 64975:\n\t\t\t\t\tswitch {\n\t\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\t\tgoto st62\n\t\t\t\t\t\t}\n\t\t\t\t\tcase data[p] >= 65008:\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st62\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st62\n\t\t}\n\t\tgoto tr0\n\ttr95:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 45 \"raw.rl\"\n\n\t\tlabel = p\n\n\t\tgoto st62\n\tst62:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof62\n\t\t}\n\tst_case_62:\n\t\t// line 2603 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr96\n\t\tcase 32:\n\t\t\tgoto tr96\n\t\tcase 45:\n\t\t\tgoto st62\n\t\tcase 46:\n\t\t\tgoto tr97\n\t\tcase 60:\n\t\t\tgoto tr27\n\t\tcase 95:\n\t\t\tgoto tr95\n\t\tcase 183:\n\t\t\tgoto st62\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st62\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st62\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st62\n\t\t}\n\t\tgoto tr0\n\ttr97:\n\t\t// line 65 \"raw.rl\"\n\n\t\tif object < 0 {\n\t\t\tpanic(\"unexpected parser state: object start not set\")\n\t\t}\n\t\tq.Object = unEscapeRaw(data[object:p], isEscaped)\n\t\tisEscaped = false\n\n\t\t// line 73 \"raw.rl\"\n\n\t\tif label < 0 {\n\t\t\tpanic(\"unexpected parser state: label start not set\")\n\t\t}\n\t\tq.Label = unEscapeRaw(data[label:p], isEscaped)\n\t\tisEscaped = false\n\n\t\tgoto st92\n\tst92:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof92\n\t\t}\n\tst_case_92:\n\t\t// line 2712 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto st88\n\t\tcase 32:\n\t\t\tgoto st88\n\t\tcase 35:\n\t\t\tgoto tr127\n\t\tcase 45:\n\t\t\tgoto st62\n\t\tcase 46:\n\t\t\tgoto st63\n\t\tcase 95:\n\t\t\tgoto st62\n\t\tcase 183:\n\t\t\tgoto st62\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st62\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st62\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st62\n\t\t}\n\t\tgoto st0\n\tst63:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof63\n\t\t}\n\tst_case_63:\n\t\tswitch data[p] {\n\t\tcase 45:\n\t\t\tgoto st62\n\t\tcase 46:\n\t\t\tgoto st63\n\t\tcase 95:\n\t\t\tgoto st62\n\t\tcase 183:\n\t\t\tgoto st62\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st62\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st62\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st62\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st62\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st62\n\t\t}\n\t\tgoto tr0\n\ttr110:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st64\n\tst64:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof64\n\t\t}\n\tst_case_64:\n\t\t// line 2890 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 85:\n\t\t\tgoto st65\n\t\tcase 117:\n\t\t\tgoto st69\n\t\t}\n\t\tgoto tr0\n\tst65:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof65\n\t\t}\n\tst_case_65:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st66\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st66\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st66\n\t\t}\n\t\tgoto tr0\n\tst66:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof66\n\t\t}\n\tst_case_66:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st67\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st67\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st67\n\t\t}\n\t\tgoto tr0\n\tst67:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof67\n\t\t}\n\tst_case_67:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st68\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st68\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st68\n\t\t}\n\t\tgoto tr0\n\tst68:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof68\n\t\t}\n\tst_case_68:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st69\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st69\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st69\n\t\t}\n\t\tgoto tr0\n\tst69:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof69\n\t\t}\n\tst_case_69:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st70\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st70\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st70\n\t\t}\n\t\tgoto tr0\n\tst70:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof70\n\t\t}\n\tst_case_70:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st71\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st71\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st71\n\t\t}\n\t\tgoto tr0\n\tst71:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof71\n\t\t}\n\tst_case_71:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st72\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st72\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st72\n\t\t}\n\t\tgoto tr0\n\tst72:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof72\n\t\t}\n\tst_case_72:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st73\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st73\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st73\n\t\t}\n\t\tgoto tr0\n\tst73:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof73\n\t\t}\n\tst_case_73:\n\t\tswitch data[p] {\n\t\tcase 33:\n\t\t\tgoto tr108\n\t\tcase 62:\n\t\t\tgoto tr109\n\t\tcase 92:\n\t\t\tgoto tr110\n\t\tcase 95:\n\t\t\tgoto tr108\n\t\tcase 126:\n\t\t\tgoto tr108\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 61:\n\t\t\tif 35 <= data[p] && data[p] <= 59 {\n\t\t\t\tgoto tr108\n\t\t\t}\n\t\tcase data[p] > 93:\n\t\t\tswitch {\n\t\t\tcase data[p] > 122:\n\t\t\t\tif 128 <= data[p] && data[p] <= 1114111 {\n\t\t\t\t\tgoto tr108\n\t\t\t\t}\n\t\t\tcase data[p] >= 97:\n\t\t\t\tgoto tr108\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto tr108\n\t\t}\n\t\tgoto tr0\n\ttr122:\n\t\t// line 29 \"raw.rl\"\n\n\t\tisEscaped = true\n\n\t\tgoto st74\n\tst74:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof74\n\t\t}\n\tst_case_74:\n\t\t// line 3089 \"raw.go\"\n\t\tswitch data[p] {\n\t\tcase 85:\n\t\t\tgoto st75\n\t\tcase 117:\n\t\t\tgoto st79\n\t\t}\n\t\tgoto tr0\n\tst75:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof75\n\t\t}\n\tst_case_75:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st76\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st76\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st76\n\t\t}\n\t\tgoto tr0\n\tst76:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof76\n\t\t}\n\tst_case_76:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st77\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st77\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st77\n\t\t}\n\t\tgoto tr0\n\tst77:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof77\n\t\t}\n\tst_case_77:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st78\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st78\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st78\n\t\t}\n\t\tgoto tr0\n\tst78:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof78\n\t\t}\n\tst_case_78:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st79\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st79\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st79\n\t\t}\n\t\tgoto tr0\n\tst79:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof79\n\t\t}\n\tst_case_79:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st80\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st80\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st80\n\t\t}\n\t\tgoto tr0\n\tst80:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof80\n\t\t}\n\tst_case_80:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st81\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st81\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st81\n\t\t}\n\t\tgoto tr0\n\tst81:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof81\n\t\t}\n\tst_case_81:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st82\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st82\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st82\n\t\t}\n\t\tgoto tr0\n\tst82:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof82\n\t\t}\n\tst_case_82:\n\t\tswitch {\n\t\tcase data[p] < 65:\n\t\t\tif 48 <= data[p] && data[p] <= 57 {\n\t\t\t\tgoto st83\n\t\t\t}\n\t\tcase data[p] > 70:\n\t\t\tif 97 <= data[p] && data[p] <= 102 {\n\t\t\t\tgoto st83\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st83\n\t\t}\n\t\tgoto tr0\n\tst83:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof83\n\t\t}\n\tst_case_83:\n\t\tswitch data[p] {\n\t\tcase 33:\n\t\t\tgoto tr120\n\t\tcase 62:\n\t\t\tgoto tr121\n\t\tcase 92:\n\t\t\tgoto tr122\n\t\tcase 95:\n\t\t\tgoto tr120\n\t\tcase 126:\n\t\t\tgoto tr120\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 61:\n\t\t\tif 35 <= data[p] && data[p] <= 59 {\n\t\t\t\tgoto tr120\n\t\t\t}\n\t\tcase data[p] > 93:\n\t\t\tswitch {\n\t\t\tcase data[p] > 122:\n\t\t\t\tif 128 <= data[p] && data[p] <= 1114111 {\n\t\t\t\t\tgoto tr120\n\t\t\t\t}\n\t\t\tcase data[p] >= 97:\n\t\t\t\tgoto tr120\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto tr120\n\t\t}\n\t\tgoto tr0\n\ttr3:\n\t\t// line 33 \"raw.rl\"\n\n\t\tsubject = p\n\n\t\tgoto st84\n\tst84:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof84\n\t\t}\n\tst_case_84:\n\t\t// line 3288 \"raw.go\"\n\t\tif data[p] == 58 {\n\t\t\tgoto st85\n\t\t}\n\t\tgoto tr0\n\tst85:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof85\n\t\t}\n\tst_case_85:\n\t\tif data[p] == 95 {\n\t\t\tgoto st86\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 895:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 767:\n\t\t\t\t\tif 880 <= data[p] && data[p] <= 893 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st86\n\t\t\t}\n\t\tcase data[p] > 8191:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8204 <= data[p] && data[p] <= 8205 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st86\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st86\n\t\t}\n\t\tgoto tr0\n\tst86:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof86\n\t\t}\n\tst_case_86:\n\t\tswitch data[p] {\n\t\tcase 9:\n\t\t\tgoto tr7\n\t\tcase 32:\n\t\t\tgoto tr7\n\t\tcase 45:\n\t\t\tgoto st86\n\t\tcase 46:\n\t\t\tgoto st87\n\t\tcase 60:\n\t\t\tgoto tr8\n\t\tcase 95:\n\t\t\tgoto st86\n\t\tcase 183:\n\t\t\tgoto st86\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st86\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st86\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st86\n\t\t}\n\t\tgoto tr0\n\tst87:\n\t\tif p++; p == pe {\n\t\t\tgoto _test_eof87\n\t\t}\n\tst_case_87:\n\t\tswitch data[p] {\n\t\tcase 45:\n\t\t\tgoto st86\n\t\tcase 46:\n\t\t\tgoto st87\n\t\tcase 95:\n\t\t\tgoto st86\n\t\tcase 183:\n\t\t\tgoto st86\n\t\t}\n\t\tswitch {\n\t\tcase data[p] < 8204:\n\t\t\tswitch {\n\t\t\tcase data[p] < 192:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65:\n\t\t\t\t\tif 48 <= data[p] && data[p] <= 58 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 90:\n\t\t\t\t\tif 97 <= data[p] && data[p] <= 122 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tcase data[p] > 214:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 248:\n\t\t\t\t\tif 216 <= data[p] && data[p] <= 246 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 893:\n\t\t\t\t\tif 895 <= data[p] && data[p] <= 8191 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st86\n\t\t\t}\n\t\tcase data[p] > 8205:\n\t\t\tswitch {\n\t\t\tcase data[p] < 12289:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 8304:\n\t\t\t\t\tif 8255 <= data[p] && data[p] <= 8256 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 8591:\n\t\t\t\t\tif 11264 <= data[p] && data[p] <= 12271 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tcase data[p] > 55295:\n\t\t\t\tswitch {\n\t\t\t\tcase data[p] < 65008:\n\t\t\t\t\tif 63744 <= data[p] && data[p] <= 64975 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tcase data[p] > 65533:\n\t\t\t\t\tif 65536 <= data[p] && data[p] <= 983039 {\n\t\t\t\t\t\tgoto st86\n\t\t\t\t\t}\n\t\t\t\tdefault:\n\t\t\t\t\tgoto st86\n\t\t\t\t}\n\t\t\tdefault:\n\t\t\t\tgoto st86\n\t\t\t}\n\t\tdefault:\n\t\t\tgoto st86\n\t\t}\n\t\tgoto tr0\n\tst_out:\n\t_test_eof1:\n\t\tcs = 1\n\t\tgoto _test_eof\n\t_test_eof2:\n\t\tcs = 2\n\t\tgoto _test_eof\n\t_test_eof3:\n\t\tcs = 3\n\t\tgoto _test_eof\n\t_test_eof4:\n\t\tcs = 4\n\t\tgoto _test_eof\n\t_test_eof5:\n\t\tcs = 5\n\t\tgoto _test_eof\n\t_test_eof6:\n\t\tcs = 6\n\t\tgoto _test_eof\n\t_test_eof7:\n\t\tcs = 7\n\t\tgoto _test_eof\n\t_test_eof8:\n\t\tcs = 8\n\t\tgoto _test_eof\n\t_test_eof9:\n\t\tcs = 9\n\t\tgoto _test_eof\n\t_test_eof10:\n\t\tcs = 10\n\t\tgoto _test_eof\n\t_test_eof88:\n\t\tcs = 88\n\t\tgoto _test_eof\n\t_test_eof89:\n\t\tcs = 89\n\t\tgoto _test_eof\n\t_test_eof11:\n\t\tcs = 11\n\t\tgoto _test_eof\n\t_test_eof12:\n\t\tcs = 12\n\t\tgoto _test_eof\n\t_test_eof13:\n\t\tcs = 13\n\t\tgoto _test_eof\n\t_test_eof14:\n\t\tcs = 14\n\t\tgoto _test_eof\n\t_test_eof15:\n\t\tcs = 15\n\t\tgoto _test_eof\n\t_test_eof16:\n\t\tcs = 16\n\t\tgoto _test_eof\n\t_test_eof17:\n\t\tcs = 17\n\t\tgoto _test_eof\n\t_test_eof18:\n\t\tcs = 18\n\t\tgoto _test_eof\n\t_test_eof19:\n\t\tcs = 19\n\t\tgoto _test_eof\n\t_test_eof20:\n\t\tcs = 20\n\t\tgoto _test_eof\n\t_test_eof21:\n\t\tcs = 21\n\t\tgoto _test_eof\n\t_test_eof22:\n\t\tcs = 22\n\t\tgoto _test_eof\n\t_test_eof23:\n\t\tcs = 23\n\t\tgoto _test_eof\n\t_test_eof24:\n\t\tcs = 24\n\t\tgoto _test_eof\n\t_test_eof25:\n\t\tcs = 25\n\t\tgoto _test_eof\n\t_test_eof26:\n\t\tcs = 26\n\t\tgoto _test_eof\n\t_test_eof90:\n\t\tcs = 90\n\t\tgoto _test_eof\n\t_test_eof27:\n\t\tcs = 27\n\t\tgoto _test_eof\n\t_test_eof28:\n\t\tcs = 28\n\t\tgoto _test_eof\n\t_test_eof29:\n\t\tcs = 29\n\t\tgoto _test_eof\n\t_test_eof30:\n\t\tcs = 30\n\t\tgoto _test_eof\n\t_test_eof31:\n\t\tcs = 31\n\t\tgoto _test_eof\n\t_test_eof32:\n\t\tcs = 32\n\t\tgoto _test_eof\n\t_test_eof33:\n\t\tcs = 33\n\t\tgoto _test_eof\n\t_test_eof34:\n\t\tcs = 34\n\t\tgoto _test_eof\n\t_test_eof35:\n\t\tcs = 35\n\t\tgoto _test_eof\n\t_test_eof36:\n\t\tcs = 36\n\t\tgoto _test_eof\n\t_test_eof37:\n\t\tcs = 37\n\t\tgoto _test_eof\n\t_test_eof38:\n\t\tcs = 38\n\t\tgoto _test_eof\n\t_test_eof39:\n\t\tcs = 39\n\t\tgoto _test_eof\n\t_test_eof40:\n\t\tcs = 40\n\t\tgoto _test_eof\n\t_test_eof41:\n\t\tcs = 41\n\t\tgoto _test_eof\n\t_test_eof42:\n\t\tcs = 42\n\t\tgoto _test_eof\n\t_test_eof43:\n\t\tcs = 43\n\t\tgoto _test_eof\n\t_test_eof44:\n\t\tcs = 44\n\t\tgoto _test_eof\n\t_test_eof45:\n\t\tcs = 45\n\t\tgoto _test_eof\n\t_test_eof46:\n\t\tcs = 46\n\t\tgoto _test_eof\n\t_test_eof47:\n\t\tcs = 47\n\t\tgoto _test_eof\n\t_test_eof48:\n\t\tcs = 48\n\t\tgoto _test_eof\n\t_test_eof49:\n\t\tcs = 49\n\t\tgoto _test_eof\n\t_test_eof50:\n\t\tcs = 50\n\t\tgoto _test_eof\n\t_test_eof51:\n\t\tcs = 51\n\t\tgoto _test_eof\n\t_test_eof52:\n\t\tcs = 52\n\t\tgoto _test_eof\n\t_test_eof53:\n\t\tcs = 53\n\t\tgoto _test_eof\n\t_test_eof54:\n\t\tcs = 54\n\t\tgoto _test_eof\n\t_test_eof55:\n\t\tcs = 55\n\t\tgoto _test_eof\n\t_test_eof56:\n\t\tcs = 56\n\t\tgoto _test_eof\n\t_test_eof57:\n\t\tcs = 57\n\t\tgoto _test_eof\n\t_test_eof58:\n\t\tcs = 58\n\t\tgoto _test_eof\n\t_test_eof91:\n\t\tcs = 91\n\t\tgoto _test_eof\n\t_test_eof59:\n\t\tcs = 59\n\t\tgoto _test_eof\n\t_test_eof60:\n\t\tcs = 60\n\t\tgoto _test_eof\n\t_test_eof61:\n\t\tcs = 61\n\t\tgoto _test_eof\n\t_test_eof62:\n\t\tcs = 62\n\t\tgoto _test_eof\n\t_test_eof92:\n\t\tcs = 92\n\t\tgoto _test_eof\n\t_test_eof63:\n\t\tcs = 63\n\t\tgoto _test_eof\n\t_test_eof64:\n\t\tcs = 64\n\t\tgoto _test_eof\n\t_test_eof65:\n\t\tcs = 65\n\t\tgoto _test_eof\n\t_test_eof66:\n\t\tcs = 66\n\t\tgoto _test_eof\n\t_test_eof67:\n\t\tcs = 67\n\t\tgoto _test_eof\n\t_test_eof68:\n\t\tcs = 68\n\t\tgoto _test_eof\n\t_test_eof69:\n\t\tcs = 69\n\t\tgoto _test_eof\n\t_test_eof70:\n\t\tcs = 70\n\t\tgoto _test_eof\n\t_test_eof71:\n\t\tcs = 71\n\t\tgoto _test_eof\n\t_test_eof72:\n\t\tcs = 72\n\t\tgoto _test_eof\n\t_test_eof73:\n\t\tcs = 73\n\t\tgoto _test_eof\n\t_test_eof74:\n\t\tcs = 74\n\t\tgoto _test_eof\n\t_test_eof75:\n\t\tcs = 75\n\t\tgoto _test_eof\n\t_test_eof76:\n\t\tcs = 76\n\t\tgoto _test_eof\n\t_test_eof77:\n\t\tcs = 77\n\t\tgoto _test_eof\n\t_test_eof78:\n\t\tcs = 78\n\t\tgoto _test_eof\n\t_test_eof79:\n\t\tcs = 79\n\t\tgoto _test_eof\n\t_test_eof80:\n\t\tcs = 80\n\t\tgoto _test_eof\n\t_test_eof81:\n\t\tcs = 81\n\t\tgoto _test_eof\n\t_test_eof82:\n\t\tcs = 82\n\t\tgoto _test_eof\n\t_test_eof83:\n\t\tcs = 83\n\t\tgoto _test_eof\n\t_test_eof84:\n\t\tcs = 84\n\t\tgoto _test_eof\n\t_test_eof85:\n\t\tcs = 85\n\t\tgoto _test_eof\n\t_test_eof86:\n\t\tcs = 86\n\t\tgoto _test_eof\n\t_test_eof87:\n\t\tcs = 87\n\t\tgoto _test_eof\n\n\t_test_eof:\n\t\t{\n\t\t}\n\t\tif p == eof {\n\t\t\tswitch cs {\n\t\t\tcase 89:\n\t\t\t\t// line 81 \"raw.rl\"\n\n\t\t\t\treturn q, nil\n\n\t\t\tcase 1, 2, 3, 4, 5, 6, 7, 8, 9, 10, 11, 12, 13, 14, 15, 16, 17, 18, 19, 20, 21, 22, 23, 24, 25, 26, 27, 28, 29, 30, 31, 32, 33, 34, 35, 36, 37, 38, 39, 40, 41, 42, 43, 44, 45, 46, 47, 48, 49, 50, 51, 52, 53, 54, 55, 56, 57, 58, 59, 60, 61, 62, 63, 64, 65, 66, 67, 68, 69, 70, 71, 72, 73, 74, 75, 76, 77, 78, 79, 80, 81, 82, 83, 84, 85, 86, 87:\n\t\t\t\t// line 88 \"raw.rl\"\n\n\t\t\t\tif p < len(data) {\n\t\t\t\t\tif r := data[p]; r < unicode.MaxASCII {\n\t\t\t\t\t\treturn q, fmt.Errorf(\"%v: unexpected rune %q at %d\", quad.ErrInvalid, data[p], p)\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn q, fmt.Errorf(\"%v: unexpected rune %q (\\\\u%04x) at %d\", quad.ErrInvalid, data[p], data[p], p)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t\treturn q, quad.ErrIncomplete\n\n\t\t\tcase 88, 90, 91, 92:\n\t\t\t\t// line 85 \"raw.rl\"\n\n\t\t\t\t// line 81 \"raw.rl\"\n\n\t\t\t\treturn q, nil\n\n\t\t\t\t// line 3664 \"raw.go\"\n\t\t\t}\n\t\t}\n\n\t_out:\n\t\t{\n\t\t}\n\t}\n\n\t// line 143 \"raw.rl\"\n\n\treturn quad.Quad{}, quad.ErrInvalid\n}", "title": "" }, { "docid": "fc185f30a88ea42992f9d9a3453bcfe0", "score": "0.53287256", "text": "func MakeRaw(subject, predicate, object, label string) (q Quad) {\n\tif subject != \"\" {\n\t\tq.Subject = Raw(subject)\n\t}\n\tif predicate != \"\" {\n\t\tq.Predicate = Raw(predicate)\n\t}\n\tif object != \"\" {\n\t\tq.Object = Raw(object)\n\t}\n\tif label != \"\" {\n\t\tq.Label = Raw(label)\n\t}\n\treturn\n}", "title": "" }, { "docid": "3f0f54ab880d889a2901b7a9a21a7020", "score": "0.5325305", "text": "func (v *TOSCAValue) RawString() string {\n\tswitch t := v.Value.(type) {\n\tcase string:\n\t\tif isQuoted(t) {\n\t\t\tvar err error\n\t\t\tt, err = strconv.Unquote(t)\n\t\t\tif err != nil {\n\t\t\t\treturn err.Error()\n\t\t\t}\n\t\t}\n\t\treturn t\n\tdefault:\n\t\tb, err := json.Marshal(t)\n\t\tif err != nil {\n\t\t\treturn err.Error()\n\t\t}\n\t\treturn string(b)\n\t}\n}", "title": "" }, { "docid": "8baa4502c14c8bef53aa0cf38a4f3945", "score": "0.5324375", "text": "func (v Value) Raw() []byte {\n\treturn v.val\n}", "title": "" }, { "docid": "1a637b8dd6ccacaabcd95b1094daba6d", "score": "0.529891", "text": "func (r *ExecuteWatch) Raw(raw io.Reader) *ExecuteWatch {\n\tr.raw = raw\n\n\treturn r\n}", "title": "" }, { "docid": "14b496330760a12a55b907d2584b258e", "score": "0.52762395", "text": "func (p *Parser) parseRawStringLiteral() ast.Expression {\n\treturn &ast.StringLiteral{\n\t\tToken: p.curToken,\n\t\tValue: p.curToken.Literal,\n\t}\n}", "title": "" }, { "docid": "9115de2e09861c0859003382a09d4661", "score": "0.5258336", "text": "func (f *BoolFilter) Raw(s RawFilterFunc) ValueFilter {\n\tf.raw(s)\n\treturn f\n}", "title": "" }, { "docid": "a1c244b240beb0938d3cda0cfc0181d1", "score": "0.5246863", "text": "func main() {\n\n\t//\n\tstr := `This is a raw string literal\n\t\"you seeing this shit?\"`\n\tfmt.Println(str)\n\n}", "title": "" }, { "docid": "d6227cb5ff1a69b3d214ed7488dd9dfa", "score": "0.5226154", "text": "func (param *Param) Raw() interface{} {\n\treturn param.rawValue.Interface()\n}", "title": "" }, { "docid": "a0cfa425ec9d99e1f2cc85bea3b7d1d4", "score": "0.521362", "text": "func ParseRaw(statement string) (quad.Quad, error) {\n\treturn nquads.ParseRaw(statement)\n}", "title": "" }, { "docid": "249faf22216bb0fb64796785ee8e066b", "score": "0.51894915", "text": "func Raw(key, val string) PropertyXML {\n\treturn PropertyXML{\n\t\tXMLName: xml.Name{Space: \"\", Local: key},\n\t\tLang: \"\",\n\t\tInnerXML: []byte(val),\n\t}\n}", "title": "" }, { "docid": "d94b2aa95dd0d65da08524eac8b29111", "score": "0.51878303", "text": "func (p *pageState) RawContent() string {\n\tif p.source.parsed == nil {\n\t\treturn \"\"\n\t}\n\tstart := p.source.posMainContent\n\tif start == -1 {\n\t\tstart = 0\n\t}\n\n\treturn string(p.source.parsed.Input()[start:])\n}", "title": "" }, { "docid": "41fad135de19623c55cb512da7b31ffd", "score": "0.51825964", "text": "func (dpv DynamicPropertyValue) Raw() interface{} {\n\treturn dpv.value\n}", "title": "" }, { "docid": "50fe231c3ab976663046642b21530c23", "score": "0.51812214", "text": "func (m Undefined) Raw() []byte {\n\treturn (&metaMessage{\n\t\tTyp: m.Typ,\n\t\tData: m.Data,\n\t}).Bytes()\n}", "title": "" }, { "docid": "0939d2ad7fc15d3e1c08d57160d149a2", "score": "0.5154186", "text": "func (x *XPath) Raw() object.Item {\n\treturn x.evaled\n}", "title": "" }, { "docid": "8399c3832a9ed9c3cd4e130ff217d1bb", "score": "0.5124296", "text": "func (v *Value) Raw() []byte {\n\treturn v.b\n}", "title": "" }, { "docid": "299f380f48f9d1e7439853a95b16f939", "score": "0.5115878", "text": "func RawString(v interface{}) string {\n\tdata, _ := Marshal(v)\n\treturn string(data)\n}", "title": "" }, { "docid": "82d4f9eded7e94f7412fca009ef65f64", "score": "0.510104", "text": "func (c *signature) Raw() ([]byte, error) {\n\tif c.blob == nil {\n\t\treturn nil, errors.ErrNilPointerValue()\n\t}\n\n\tb := make([]byte, len(c.blob))\n\tcopy(b, c.blob)\n\n\treturn b, nil\n}", "title": "" }, { "docid": "42515c1654f7abede8acbb059b08757b", "score": "0.5091108", "text": "func (c *CommandLine) RawCommand() string {\n\treturn c.WordAtIndex(0)\n}", "title": "" }, { "docid": "070a4cc200ef75d2987dcbdc036cc7f0", "score": "0.507121", "text": "func StripRaw(text string) string {\n\tfor i := 0; i < len(codes); i++ {\n\t\ttext = strings.Replace(text, codes[i].val, \"\", -1)\n\t}\n\n\treturn text\n}", "title": "" }, { "docid": "64011534943c6fcca29e427cdba27d11", "score": "0.5053189", "text": "func (d *DynamicValue) String() string {\n\ts := string(d.Raw)\n\tc, err := strconv.Unquote(s)\n\tif err == nil {\n\t\ts = c\n\t}\n\treturn s\n}", "title": "" }, { "docid": "cd7c1e56dbd5529458791f14bb73f67b", "score": "0.50464064", "text": "func (b *WhereBuilder) WhereRaw(query string, params ...interface{}) *WhereBuilder {\n\tvar (\n\t\tf = &format{\n\t\t\tquery: query,\n\t\t\tparams: params,\n\t\t}\n\t\ts = b.and()\n\t)\n\tb.params = append(b.params, f.Params()...)\n\tb.groups = append(b.groups, func() string {\n\t\treturn s + f.Grammar(b.g()).String()\n\t})\n\treturn b\n}", "title": "" }, { "docid": "b7704c4fe6cc1da88713ba2bbf51817e", "score": "0.5044583", "text": "func (d *DynamicValue) String() string {\n\ts := string(d.Raw)\n\tc, err := strconv.Unquote(s)\n\tif err == nil {\n\t\ts = c\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "4cb4c49c1518f7cf121742ef544a0a53", "score": "0.5041962", "text": "func (n Number) Raw() float64 {\n\treturn n.value\n}", "title": "" }, { "docid": "10e656b22f8ff05c4ee09c62b6eaa4bb", "score": "0.5033625", "text": "func (s *Space) RawQuery(t ...interface{}) (tp interface{}, e interface{}) {\n\ttp, e = Query(*s.p, t...)\n\treturn tp, e\n}", "title": "" }, { "docid": "c57aa7d0a7954aef2bab40ef6e01a413", "score": "0.50294626", "text": "func (b *Builder) Raw() (string, []tg.MessageEntityClass) {\n\tmsg := b.message.String()\n\tentities := b.entities\n\tb.Reset()\n\treturn msg, entities\n}", "title": "" }, { "docid": "6c47eefe72e24847bce94013fbb05806", "score": "0.5018057", "text": "func (p PolyAftertouch) Raw() []byte {\n\treturn channelMessage2(p.channel, 10, p.key, p.pressure)\n}", "title": "" }, { "docid": "0f4e632febea85eb50c648f19d88b0cf", "score": "0.50025773", "text": "func (idx *Index) RawQuery(query string) *PQLBaseQuery {\n\treturn NewPQLBaseQuery(query, idx, nil)\n}", "title": "" }, { "docid": "49797892032a249d4b946fe8b8de5599", "score": "0.50019926", "text": "func (osfs) RawPath(path string) (string, error) {\n\treturn path, nil\n}", "title": "" }, { "docid": "ea0ae54c2bb0551678e741dee13ab384", "score": "0.49916878", "text": "func New(s string) (*ReversePolishNotation, error) {\n\tnop, n := 0, len(s)\n\toperators := make([]string, n)\n\tnotation := []string{}\n\n\ti := 0\n\tpopPushOp := func(op string) {\n\t\tpriority := priorities[op]\n\t\tfor nop > 0 && priorities[operators[nop-1]] >= priority {\n\t\t\tnop--\n\t\t\tnotation = append(notation, operators[nop])\n\t\t}\n\t\toperators[nop] = op\n\t\tnop++\n\t\ti++\n\t}\n\n\tfor i < n {\n\t\tc := s[i]\n\t\tswitch c {\n\t\tcase ' ':\n\t\t\ti++\n\t\tcase ')':\n\t\t\tfor nop > 0 && operators[nop-1] != \"(\" {\n\t\t\t\tnop--\n\t\t\t\tnotation = append(notation, operators[nop])\n\t\t\t}\n\t\t\tif nop == 0 || operators[nop-1] != \"(\" {\n\t\t\t\treturn nil, fmt.Errorf(\"'%v' has no '(' found for ')' at %v\", s, i)\n\t\t\t}\n\t\t\tnop--\n\t\t\tif nop > 0 && operators[nop-1] == \"!\" {\n\t\t\t\tnotation = append(notation, \"!\")\n\t\t\t\tnop--\n\t\t\t}\n\t\t\ti++\n\t\tcase '(':\n\t\t\toperators[nop] = \"(\"\n\t\t\tnop++\n\t\t\ti++\n\t\tcase '*', '/', '%', '+', '-':\n\t\t\tpopPushOp(string(c))\n\t\tcase '!':\n\t\t\tnext := s[i+1]\n\t\t\tif next == '(' {\n\t\t\t\toperators[nop] = string(c)\n\t\t\t\tnop++\n\t\t\t\ti++\n\t\t\t} else if next == '=' {\n\t\t\t\ti++\n\t\t\t\tpopPushOp(string([]byte{c, next}))\n\t\t\t} else {\n\t\t\t\treturn nil, fmt.Errorf(\"'%v' has invalid token at %v: %v\", s, i+1, next)\n\t\t\t}\n\t\tcase '>', '<':\n\t\t\top := []byte{c}\n\t\t\tif s[i+1] == '=' {\n\t\t\t\top = append(op, '=')\n\t\t\t\ti++\n\t\t\t}\n\t\t\tpopPushOp(string(op))\n\t\tcase '|', '&', '=':\n\t\t\tnext := s[i+1]\n\t\t\tif next != c {\n\t\t\t\treturn nil, fmt.Errorf(\"'%v' has invalid token at %v: %v\", s, i+1, next)\n\t\t\t}\n\t\t\ti++\n\t\t\tpopPushOp(string([]byte{c, next}))\n\t\tcase '0', '1', '2', '3', '4', '5', '6', '7', '8', '9':\n\t\t\thasDot := false\n\t\t\tnum := []byte{}\n\t\t\tfor i < n {\n\t\t\t\tc = s[i]\n\t\t\t\tif c == '.' {\n\t\t\t\t\tif hasDot || len(num) == 0 {\n\t\t\t\t\t\treturn nil, fmt.Errorf(\"'%v' has invalid token at %v: %v\", s, i, c)\n\t\t\t\t\t}\n\t\t\t\t\thasDot = true\n\t\t\t\t} else if !strings.Contains(numbers, string(c)) {\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t\tnum = append(num, c)\n\t\t\t\ti++\n\t\t\t}\n\t\t\tnotation = append(notation, string(num))\n\t\tcase 'N':\n\t\t\tnotation = append(notation, \"N\")\n\t\t\ti++\n\t\tdefault:\n\t\t\treturn nil, fmt.Errorf(\"'%v' has invalid token at %v: %v\", s, i, c)\n\t\t}\n\t}\n\n\tfor nop > 0 {\n\t\tnop--\n\t\tif op := operators[nop]; op != \"(\" {\n\t\t\tnotation = append(notation, op)\n\t\t}\n\t}\n\n\treturn &ReversePolishNotation{notation: notation}, nil\n}", "title": "" }, { "docid": "e5068655e8bfacce959d51a66c2e0779", "score": "0.4986456", "text": "func (f *NilFilter) Raw(s RawFilterFunc) ValueFilter {\n\tf.raw(s)\n\treturn f\n}", "title": "" }, { "docid": "4cddf73eeeec56c459cce70e6ad5c2b2", "score": "0.4972124", "text": "func NewRawSQL(text string) Clauser {\n\treturn &rawSQL{text}\n}", "title": "" }, { "docid": "0dc98ff0953b63d8b549dfdc94590dd3", "score": "0.4965319", "text": "func (g *JFrogFactory) Raw() Tool {\n\treturn &JFrogTool{}\n}", "title": "" }, { "docid": "3c04ef8c6a918e1f55c329fee3f4fe8b", "score": "0.49642304", "text": "func (n *Node) ToPolish() string {\n\tif !n.valid() {\n\t\treturn fmt.Sprintf(\"invalid formula: '%s'\", n)\n\t}\n\tif n.op == OpNull {\n\t\treturn n.val.String()\n\t} else {\n\t\tvar s string\n\t\tif n.op != OpMinus {\n\t\t\ts = n.op.String()\n\t\t} else {\n\t\t\ts = \"--\"\n\t\t}\n\t\ts += \" \" + n.left.ToPolish()\n\t\tif n.op.binary() {\n\t\t\ts += \" \" + n.right.ToPolish()\n\t\t}\n\t\treturn s\n\t}\n}", "title": "" }, { "docid": "27badeb5c13cd1ff674f140f8d68d6af", "score": "0.49609634", "text": "func (e Env) Raw() []string {\n\tenv := make([]string, 0)\n\tfor k, v := range e {\n\t\tenv = append(env, fmt.Sprintf(\"%s=%s\", k, v))\n\t}\n\treturn env\n}", "title": "" }, { "docid": "c823c1ca9a33f277cf9deb8b499ee68a", "score": "0.49456346", "text": "func (dmi *DMI) Raw() (interface{}, error) {\n\treturn reflect.Indirect(reflect.ValueOf(dmi.decoded)).Interface(), nil\n}", "title": "" }, { "docid": "e95f519c1c60aeae892f00942a925cf8", "score": "0.49447113", "text": "func (e Email) Raw() (string, error) {\n\n\tmsg := gomail.NewMessage()\n\tmsg.SetHeader(\"From\", fmt.Sprintf(\"%s <%s>\", e.FromName, e.FromEmail))\n\tmsg.SetHeader(\"To\", fmt.Sprintf(\"%s <%s>\", e.ToName, e.ToEmail))\n\tmsg.SetHeader(\"Subject\", e.Subject)\n\tmsg.SetBody(\"text/plain\", e.PlainContent)\n\tmsg.AddAlternative(\"text/html\", e.HTMLContent)\n\n\tfor i := 0; i < len(e.Attachments); i++ {\n\n\t\txb, err := base64.StdEncoding.DecodeString(e.Attachments[i].Base64Content)\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"DecodeString() err = %s\", err)\n\t\t}\n\t\tmsg.Attach(e.Attachments[i].FileName, gomail.SetCopyFunc(func(w io.Writer) error {\n\t\t\t_, err := w.Write(xb)\n\t\t\treturn err\n\t\t}))\n\t}\n\n\tvar emailRaw bytes.Buffer\n\tmsg.WriteTo(&emailRaw)\n\n\treturn string(emailRaw.Bytes()), nil\n}", "title": "" }, { "docid": "6a2ba1b459305f0a01058d452e8e7e00", "score": "0.49400428", "text": "func (m SongSelect) Raw() []byte {\n\t// TODO check - it is a guess\n\treturn []byte{byte(0xF3), byte(m)}\n}", "title": "" }, { "docid": "f7459384a49fb5ea81ab542c5afd965d", "score": "0.49395964", "text": "func (b *Bot) Raw(method string, payload interface{}) ([]byte, error) {\n\turl := fmt.Sprintf(\"https://api.telegram.org/bot%s/%s\", b.Token, method)\n\n\tvar buf bytes.Buffer\n\tif err := json.NewEncoder(&buf).Encode(payload); err != nil {\n\t\treturn []byte{}, wrapSystem(err)\n\t}\n\n\tresp, err := b.client.Post(url, \"application/json\", &buf)\n\tif err != nil {\n\t\treturn []byte{}, errors.Wrap(err, \"http.Post failed\")\n\t}\n\tresp.Close = true\n\tdefer resp.Body.Close()\n\tjson, err := ioutil.ReadAll(resp.Body)\n\tif err != nil {\n\t\treturn []byte{}, wrapSystem(err)\n\t}\n\n\treturn json, nil\n}", "title": "" }, { "docid": "c1cfe0cf3b98e6bd453cf8ee9eec7379", "score": "0.49380204", "text": "func (a *Session) RawCommand(params ...interface{}) (Reply, error) {\n\tvar cmd string\n\tfor _, par := range params {\n\t\tcmd = fmt.Sprintf(\"%s %v\", cmd, par)\n\t}\n\treturn a.sendMsg(cmd)\n}", "title": "" }, { "docid": "431d00264f58d9c0f5e8b5a0adc1e6fc", "score": "0.49123707", "text": "func (o *ormBase) Raw(query string, args ...interface{}) RawSeter {\n\treturn o.RawWithCtx(context.Background(), query, args...)\n}", "title": "" }, { "docid": "f1a5dffddff867f0c94433848db22f96", "score": "0.4904667", "text": "func (c *Conn) Raw(f func(driverConn interface{}) error) (err error) {}", "title": "" }, { "docid": "b9ab96004b04668cf2516a7de4ebae39", "score": "0.4897462", "text": "func (p protocolCommand) GetRaw() []byte {\n\treturn []byte(p.Name)\n}", "title": "" }, { "docid": "af6cdb830d6ae3b5fa089d45370b67a1", "score": "0.48924473", "text": "func Raw(value json.RawMessage) Value {\n\tif len(value) == 0 {\n\t\treturn Null()\n\t}\n\treturn Value{valueType: RawType, rawValue: slices.Clone(value)}\n}", "title": "" }, { "docid": "79d89e547ba8acc1045526ca39f06249", "score": "0.48885873", "text": "func lexRawString(lx *lexer) stateFn {\n\tr := lx.next()\n\tswitch {\n\tcase r == eof:\n\t\treturn lx.errorf(\"unexpected EOF\")\n\tcase isNL(r):\n\t\treturn lx.errorf(\"strings cannot contain newlines\")\n\tcase r == rawStringEnd:\n\t\tlx.backup()\n\t\tlx.emit(itemRawString)\n\t\tlx.next()\n\t\tlx.ignore()\n\t\treturn lx.pop()\n\t}\n\treturn lexRawString\n}", "title": "" }, { "docid": "fe2d095dedb16e64593fb245067548f8", "score": "0.487306", "text": "func (s *SafeTree) Raw() interface{} {\n\treturn s.state\n}", "title": "" }, { "docid": "bdd4eddd6fbeb75af6f41974e1852848", "score": "0.4869355", "text": "func (p *prettyLogger) Raw(args ...interface{}) {\n\t_, _ = fmt.Fprint(p.writer.Output, args...)\n\treturn\n}", "title": "" }, { "docid": "b60d3e2a7e6198eeec612ed2a7544812", "score": "0.48584402", "text": "func (r *Response) Raw() ([]byte, error) {\n\tif r.Err != nil {\n\t\treturn nil, r.Err\n\t}\n\tdefer r.R.Body.Close()\n\n\treturn ioutil.ReadAll(r.R.Body)\n}", "title": "" }, { "docid": "32006c08669d6895da52328a4626baef", "score": "0.48573685", "text": "func (c *Context) QueryRawString() string {\n\treturn c.req.URL.RawQuery\n}", "title": "" }, { "docid": "f469d9c5484e487091abfd870c5ac9a8", "score": "0.4853424", "text": "func (e *Expr) RPN() []string {\n\tvar s []string\n\tfor i := range e.rpn {\n\t\ts = append(s, e.rpn[i].Str)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "9cb694bc6d17c6e683773c6d0f029b14", "score": "0.4853386", "text": "func (rc *RuntimeClient) ExecuteRaw(cmd string) (string, error) {\n\treturn rc.client.ExecuteRaw(cmd)\n}", "title": "" }, { "docid": "59342090b99b8313dc5499cee18549e3", "score": "0.4846548", "text": "func lexRawStringLit(l *lexer) stateFn {\n\tfor {\n\t\tr := l.next()\n\t\tswitch r {\n\t\tcase eof:\n\t\t\treturn l.errorf(\"lexer.lexRawStringLiteral: unexpected eof in raw string literal\")\n\t\tcase '`':\n\t\t\tl.emit(token.String)\n\t\t\treturn lexLine\n\t\t}\n\t}\n}", "title": "" }, { "docid": "0a9f1146e5b3281fb81e9f6e5b957f90", "score": "0.4841345", "text": "func (this EvaluableExpression) String() string {\n\n\treturn this.inputExpression\n}", "title": "" }, { "docid": "5c633a3c994d11306b234f7035d42067", "score": "0.4839844", "text": "func (r RawStatus) Raw() RawStatus {\n\treturn r\n}", "title": "" }, { "docid": "68cff1fe50b57c6a855cc7fb20283d89", "score": "0.4838724", "text": "func (w *Worker) RawPublish(opts PublishOpts) error {\n\treturn w.Ch.Publish(\n\t\topts.Exchange,\n\t\topts.Key,\n\t\topts.Mandatory,\n\t\topts.Immediate,\n\t\topts.Msg,\n\t)\n}", "title": "" }, { "docid": "476a439e2edd16cb470d4750a9ec20e6", "score": "0.48296058", "text": "func (s *Space) RawQueryP(t ...interface{}) (tp interface{}, e interface{}) {\n\ttp, e, _ = QueryP(*s.p, t...)\n\treturn tp, e\n}", "title": "" }, { "docid": "12fe55493384b45949ecbc49608bd0ad", "score": "0.48265412", "text": "func (r *Response) Raw() ([]byte, error) {\n\tif r.Err != nil {\n\t\treturn nil, r.Err\n\t}\n\tdefer r.R.Body.Close()\n\n\tb, err := ioutil.ReadAll(r.R.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn b, nil\n}", "title": "" }, { "docid": "4edce5f6d185a83554e394489be47cd8", "score": "0.4811352", "text": "func RawStatement(rawQuery string, namedArguments ...RawArgs) Statement {\n\treturn jet.RawStatement(Dialect, rawQuery, namedArguments...)\n}", "title": "" }, { "docid": "aeb7ce04fcbbfe77ab4c73a314417835", "score": "0.4802598", "text": "func (p PeerID) RawString() string {\n\treturn string(p.Bytes())\n}", "title": "" }, { "docid": "329c45fedde74dece5ec387473cd27a1", "score": "0.47912234", "text": "func EvalRPN(exp []byte) (bool, error) {\n\ts := list.New()\n\n\tfor _, v := range exp {\n\t\tswitch v {\n\t\tcase '!':\n\t\t\ta := pop(s)\n\t\t\tpush(s, !a)\n\t\tcase '&':\n\t\t\ta := pop(s)\n\t\t\tb := pop(s)\n\t\t\tpush(s, a && b)\n\t\tcase '|':\n\t\t\ta := pop(s)\n\t\t\tb := pop(s)\n\t\t\tpush(s, a || b)\n\t\tcase '^':\n\t\t\ta := pop(s)\n\t\t\tb := pop(s)\n\t\t\tpush(s, a != b)\n\t\tcase 'T', 't':\n\t\t\tpush(s, true)\n\t\tcase 'F', 'f':\n\t\t\tpush(s, false)\n\t\tdefault:\n\t\t\treturn false, ErrCharIll\n\t\t}\n\t}\n\tif s.Len() != 1 {\n\t\treturn false, ErrEval\n\t}\n\treturn pop(s), nil\n}", "title": "" }, { "docid": "3cb75b158938321e183fbdaa5f31fd93", "score": "0.47897026", "text": "func (id NumericID) Raw() interface{} {\n\treturn id\n}", "title": "" }, { "docid": "15ddf39aa62b07390a1e76f857ed0e3d", "score": "0.47538382", "text": "func RawError(err error) error {\n\tif err == nil {\n\t\treturn err\n\t}\n\n\tif atError, ok := err.(errors.Error); ok {\n\t\treturn atError.Cause()\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "90e5609199d3e8b5403888704da2cb5a", "score": "0.47193664", "text": "func (c *Context) ExecuteRaw(command Command) (pr *ProcessResult, err error) {\n\tpr, err = c.Execute(CommandConfig{\n\t\tRawStdout: true,\n\t\tRawStderr: true,\n\t\tConnectStdin: true,\n\t}, command)\n\treturn\n}", "title": "" }, { "docid": "febfce29a4e57f8f3ba16be30b81166e", "score": "0.47152886", "text": "func (bot *Bot) RawCmd(message string) {\n fmt.Fprintf(bot.Conn,message)\n}", "title": "" }, { "docid": "9bd51c2fc45044aafb598fa8233a31d0", "score": "0.47133073", "text": "func (s symbolImpl) Eval() interface{} {\n\treturn string(s)\n}", "title": "" }, { "docid": "382be4de1919dfe0fdc45d783933c24f", "score": "0.47128323", "text": "func Rawurlencode(s string) string {\n\n\treturn url.PathEscape(s)\n}", "title": "" }, { "docid": "3a9f14326d1d7552a7a6e74fcb0f39fb", "score": "0.47103968", "text": "func Rstr(re string) string {\n\tthree, err := syntax.Parse(re, syntax.PerlX)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn handleState(three)\n}", "title": "" }, { "docid": "e6f5f3413571ea4c9bdfd59ff46cc86e", "score": "0.47018826", "text": "func (id ULID) Raw() interface{} {\n\treturn id\n}", "title": "" }, { "docid": "a23dc6f2487fcfdde01b53b8efb3bee0", "score": "0.46962056", "text": "func (m SPP) Raw() []byte {\n\tvar b = make([]byte, 2)\n\tb[1] = byte(uint16(m) & 0x7F)\n\tb[0] = byte((uint16(m) >> 7) & 0x7F)\n\n\t// r := msbLsbUnsigned(uint16(m))\n\t// binary.BigEndian.PutUint16(b, r)\n\n\t//return []byte{0xF2, b[1], b[0]}\n\n\treturn []byte{0xF2, b[0], b[1]}\n}", "title": "" }, { "docid": "8fca79fb454d3bf8ff819a62e466cc5d", "score": "0.46916243", "text": "func Raw(b []byte) Field {\n\treturn func(p *Packet) error {\n\t\tif p.Len()+len(b) > MaxEIRPacketLength {\n\t\t\treturn ErrNotFit\n\t\t}\n\t\tp.b = append(p.b, b...)\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "138804b7d66949ef104eac7fd4071d1c", "score": "0.46894506", "text": "func RawURLEncodeToString(bs []byte) string {\n\tret := base64.URLEncoding.EncodeToString(bs)\n\treturn strings.TrimRight(ret, \"=\")\n}", "title": "" }, { "docid": "fa11591dc20af8e1d5e01cee60362599", "score": "0.46816853", "text": "func GetPolandString(expr string) string {\n\tresult := \"\"\n\tstk := GetPoland(expr)\n\tfor {\n\t\titem, err := stk.Pop()\n\t\tif err != nil {\n\t\t\tbreak\n\t\t}\n\t\tresult += item + \" \"\n\t}\n\treturn result\n}", "title": "" } ]
5985decb21324417107e41bed07e7480
Send mocks base method.
[ { "docid": "f4ab5eb42070cf07ea41b820a5ea6dcd", "score": "0.7294059", "text": "func (m *MockGitops_GetObjectsToSynchronizeServer) Send(arg0 *rpc.ObjectsToSynchronizeResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" } ]
[ { "docid": "07626e6cd186d0735e43dce1a0b51db5", "score": "0.74400985", "text": "func (m *MockWorker_FetchDDLInfoServer) Send(arg0 *pb.DDLInfo) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e015e5d4888a87d9d34b82d8c19be70a", "score": "0.74091417", "text": "func (m *MockPrivateTransactionManager) Send(arg0 []byte, arg1 string, arg2 []string, arg3 *engine.ExtraMetadata) (string, []string, common.EncryptedPayloadHash, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0, arg1, arg2, arg3)\n\tret0, _ := ret[0].(string)\n\tret1, _ := ret[1].([]string)\n\tret2, _ := ret[2].(common.EncryptedPayloadHash)\n\tret3, _ := ret[3].(error)\n\treturn ret0, ret1, ret2, ret3\n}", "title": "" }, { "docid": "0b2009fea1ed76eeb42f8c3cbb07d03f", "score": "0.73368895", "text": "func (m *MockHistoryService_StreamWorkflowReplicationMessagesServer) Send(arg0 *historyservice.StreamWorkflowReplicationMessagesResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "8fc70e70f10a2106781b8bbe896a28a3", "score": "0.7317538", "text": "func (m *MockSerial) Send(arg0 []byte) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "1ba3fb0d0a600174b81d9f4bd9aa762c", "score": "0.7289655", "text": "func (m *MockByteStream_WriteClient) Send(arg0 *bytestream.WriteRequest) error {\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4b1428baa2b4a82dc9c7e5169263439a", "score": "0.7244228", "text": "func (m *MockWorker_FetchDDLInfoClient) Send(arg0 *pb.DDLLockInfo) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a0b29eb350b88bb8f4e3a63a86bfb4f6", "score": "0.7209316", "text": "func (m *MockHistoryService_StreamWorkflowReplicationMessagesClient) Send(arg0 *historyservice.StreamWorkflowReplicationMessagesRequest) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "c072454fb39c49fd44e458b1464bfbaa", "score": "0.72049254", "text": "func (m *MockLineService) Send(message string) error {\n\tret := m.ctrl.Call(m, \"Send\", message)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "599cc6ba84d997129c2f9df08b50c7da", "score": "0.714562", "text": "func (m *MockClient) Send(arg0 Packet) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "31395124ec125b281b4a0310b32d756c", "score": "0.7098541", "text": "func (m *MockReverseTunnel_ConnectServer) Send(arg0 *rpc.ConnectResponse) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "ae36eb742343c196783f8bca27b2a32a", "score": "0.7093683", "text": "func (m *MockStreamSender) scheduleSending() {\n\tm.ctrl.Call(m, \"scheduleSending\")\n}", "title": "" }, { "docid": "7f6dc6924aade34c1ee5ad71b67a69f6", "score": "0.70703024", "text": "func (m *MockMessage) Send(ctx context.Context, network string, to, from, data []byte, signer signer.Signer, opts sender.SendOpts) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", ctx, network, to, from, data, signer, opts)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "47a99b28417de9dc2d50e1f42f75e64c", "score": "0.70665663", "text": "func (m *MockTx) Send(data map[string]interface{}) (*api.ResultHash, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", data)\n\tret0, _ := ret[0].(*api.ResultHash)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "51dc7312828ec9b7421790e0861ba27a", "score": "0.7064861", "text": "func (m *MockTLSExtensionHandler) Send(arg0 mint.HandshakeType, arg1 *mint.ExtensionList) error {\n\tret := m.ctrl.Call(m, \"Send\", arg0, arg1)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "2f9dff339e612371c7a3b4a606e9f075", "score": "0.70574903", "text": "func (m *MockQueue) Send(arg0 string, arg1 queue.QueueMsg) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0, arg1)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "99e9b0cf31ef6e14d847a0c1150d5031", "score": "0.7036532", "text": "func (m *MockReverseTunnel_ConnectClient) Send(arg0 *rpc.ConnectRequest) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4d85271b62ddc0c33c2aaab29a711c63", "score": "0.7024628", "text": "func (m *MockPongService_PingPongRPCClient) Send(arg0 *pong.PongData) error {\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "2459f24345cf19ecbae21ca79c0a4b08", "score": "0.69798565", "text": "func (m *MockTelegram) Send(c telegram_bot_api.Chattable) (telegram_bot_api.Message, error) {\n\tret := m.ctrl.Call(m, \"Send\", c)\n\tret0, _ := ret[0].(telegram_bot_api.Message)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "339baea90a65c19f8775d114dfe3b944", "score": "0.69067824", "text": "func (m *SenderMock) Send(p context.Context, p1 *message.Message) (r <-chan *message.Message, r1 func()) {\n\tcounter := atomic.AddUint64(&m.SendPreCounter, 1)\n\tdefer atomic.AddUint64(&m.SendCounter, 1)\n\n\tif len(m.SendMock.expectationSeries) > 0 {\n\t\tif counter > uint64(len(m.SendMock.expectationSeries)) {\n\t\t\tm.t.Fatalf(\"Unexpected call to SenderMock.Send. %v %v\", p, p1)\n\t\t\treturn\n\t\t}\n\n\t\tinput := m.SendMock.expectationSeries[counter-1].input\n\t\ttestify_assert.Equal(m.t, *input, SenderMockSendInput{p, p1}, \"Sender.Send got unexpected parameters\")\n\n\t\tresult := m.SendMock.expectationSeries[counter-1].result\n\t\tif result == nil {\n\t\t\tm.t.Fatal(\"No results are set for the SenderMock.Send\")\n\t\t\treturn\n\t\t}\n\n\t\tr = result.r\n\t\tr1 = result.r1\n\n\t\treturn\n\t}\n\n\tif m.SendMock.mainExpectation != nil {\n\n\t\tinput := m.SendMock.mainExpectation.input\n\t\tif input != nil {\n\t\t\ttestify_assert.Equal(m.t, *input, SenderMockSendInput{p, p1}, \"Sender.Send got unexpected parameters\")\n\t\t}\n\n\t\tresult := m.SendMock.mainExpectation.result\n\t\tif result == nil {\n\t\t\tm.t.Fatal(\"No results are set for the SenderMock.Send\")\n\t\t}\n\n\t\tr = result.r\n\t\tr1 = result.r1\n\n\t\treturn\n\t}\n\n\tif m.SendFunc == nil {\n\t\tm.t.Fatalf(\"Unexpected call to SenderMock.Send. %v %v\", p, p1)\n\t\treturn\n\t}\n\n\treturn m.SendFunc(p, p1)\n}", "title": "" }, { "docid": "a930f7be36a58b29e37c0ae9930d7575", "score": "0.68884057", "text": "func (mock *PublisherMock) Send(message model.RecipeMessage) error {\n\tmock.Queue = append(mock.Queue, message)\n\treturn nil\n}", "title": "" }, { "docid": "a9ccc6ae7ce505ca75c45201f2a8aee6", "score": "0.68847924", "text": "func (m *MockUser) Send(body *api.BodySendCoin) (*api.ResultHash, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", body)\n\tret0, _ := ret[0].(*api.ResultHash)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "8f0935f3b1daca4628d81600ce627cb3", "score": "0.6875078", "text": "func (m *MockGitops_GetObjectsToSynchronizeServer) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "574fb83185ca5e5fcc431fd8f0bc9015", "score": "0.6771182", "text": "func (m *MockTxEventService_OnConnectedClient) Send(arg0 *sagagrpc.GrpcServiceConfig) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Send\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4ac08fb69f55599c385c23e6e509c9fb", "score": "0.6767783", "text": "func (mock *Client) Send(dest string, msg chat.Message) error {\n\treturn mock.SendFunc(dest, msg)\n}", "title": "" }, { "docid": "f97736efb76e62f7deb461e1bfee2c68", "score": "0.6762416", "text": "func (m_2 *MockWorker_FetchDDLInfoServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "0edf883330e290e21ce6f4b7c894718a", "score": "0.6707721", "text": "func (ms *mockSender) Send(from string, to []string, msg io.WriterTo) error {\n\tmm := newMockMessage(from, to, msg)\n\tms.messages = append(ms.messages, mm)\n\tms.status = \"sent\"\n\treturn ms.send(mm)\n}", "title": "" }, { "docid": "052099a38afe2219fc1fb4e6c0642ed5", "score": "0.6677531", "text": "func (m *MockGitops_GetObjectsToSynchronizeClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "28e863480015ba90ba4780360c663b02", "score": "0.6667418", "text": "func (c *mockKvClient) Send(ctx context.Context, req *kv.Request) kv.Response {\n\treturn nil\n}", "title": "" }, { "docid": "d55e3d657e41b397b55c48eb525541e4", "score": "0.6657072", "text": "func (mock *ServerMock) Send(msg *Message) error {\n\tlogger.Debugf(\"send per chat in channel: %s message: %s\", msg.ChannelName, msg.Content)\n\tmock.Messages = append(mock.Messages, msg)\n\treturn nil\n}", "title": "" }, { "docid": "20e4ec9026ccd5dd0fc3db4393a0723d", "score": "0.6641365", "text": "func (s *Sink) Send(m frizzle.Msg, dest string) error {\n\tif s.isMock {\n\t\treturn nil\n\t}\n\tif _, ok := s.sent[dest]; !ok {\n\t\ts.sent[dest] = make([]frizzle.Msg, 0)\n\t}\n\ts.sent[dest] = append(s.sent[dest], m)\n\treturn nil\n}", "title": "" }, { "docid": "003a5a68f110302436bdb230ded98fdf", "score": "0.6628967", "text": "func (_m *MockCollectionConfigService_GetConfigStreamServer) Send(_a0 *GetConfigStreamResponse) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*GetConfigStreamResponse) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "0f806129072871658ddd2944eb8ca51b", "score": "0.66078323", "text": "func (m_2 *MockWorker_FetchDDLInfoClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e0b31a291165232a844f355042a09446", "score": "0.6601145", "text": "func (m *MockGitops_GetObjectsToSynchronizeClient) CloseSend() error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CloseSend\")\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "ce462fd430cd6b116ffd64fc1f0a6433", "score": "0.6600241", "text": "func (m *MockIngester_IngestServer) SendMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "0d5990b9f796d31e59e55a4653cefd23", "score": "0.6588535", "text": "func (_m *BtcIndexer_SyncStream) Send(_a0 *btcindexersrv.SyncResponse) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(*btcindexersrv.SyncResponse) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "ef3a518511531af75a0f583dce257e39", "score": "0.65723366", "text": "func (m *MockSlacker) SendMessage(arg0 *slack.OutgoingMessage) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"SendMessage\", arg0)\n}", "title": "" }, { "docid": "ba7eb9dec54812ace1d186da69353f95", "score": "0.65481734", "text": "func (ms MockWebhookSender) Send(ctx context.Context, m Message) error {\n\tms <- m\n\treturn nil\n}", "title": "" }, { "docid": "fed948529c4280ec4f2c10fe54d74559", "score": "0.6472381", "text": "func (m *mSenderMockSend) Expect(p context.Context, p1 *message.Message) *mSenderMockSend {\n\tm.mock.SendFunc = nil\n\tm.expectationSeries = nil\n\n\tif m.mainExpectation == nil {\n\t\tm.mainExpectation = &SenderMockSendExpectation{}\n\t}\n\tm.mainExpectation.input = &SenderMockSendInput{p, p1}\n\treturn m\n}", "title": "" }, { "docid": "d3e256b10443432bf6df08458e046ded", "score": "0.645657", "text": "func (m *MockIngester_IngestServer) SendAndClose(arg0 *empty.Empty) error {\n\tret := m.ctrl.Call(m, \"SendAndClose\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "52df896541052721490b4de6832be64f", "score": "0.6456005", "text": "func (_m *ConnWithTimeout) Send(commandName string, args ...interface{}) error {\n\tvar _ca []interface{}\n\t_ca = append(_ca, commandName)\n\t_ca = append(_ca, args...)\n\tret := _m.Called(_ca...)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(string, ...interface{}) error); ok {\n\t\tr0 = rf(commandName, args...)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "5dbd3db5c3cd24fa16409dc3d4ffbb19", "score": "0.64318347", "text": "func (m *MockTaskServerIface) SendChain(arg0 *tasks.Chain) (*result.ChainAsyncResult, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendChain\", arg0)\n\tret0, _ := ret[0].(*result.ChainAsyncResult)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "5ae222d2541bb92372cf06ad6785ea84", "score": "0.6415853", "text": "func (m_2 *MockHistoryService_StreamWorkflowReplicationMessagesServer) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "3f1adbfaf151df966439bf8daa1ab0e0", "score": "0.64077854", "text": "func (m *mHostNetworkMockSendRequest) Expect(p context.Context, p1 types.PacketType, p2 interface{}, p3 insolar.Reference) *mHostNetworkMockSendRequest {\n\tm.mock.SendRequestFunc = nil\n\tm.expectationSeries = nil\n\n\tif m.mainExpectation == nil {\n\t\tm.mainExpectation = &HostNetworkMockSendRequestExpectation{}\n\t}\n\tm.mainExpectation.input = &HostNetworkMockSendRequestInput{p, p1, p2, p3}\n\treturn m\n}", "title": "" }, { "docid": "2fefa85dd49b8fe3fc307e044f6a4778", "score": "0.6391605", "text": "func (m *MockChannel) SendRequest(arg0 api.Message) api.RequestCtx {\n\tret := m.ctrl.Call(m, \"SendRequest\", arg0)\n\tret0, _ := ret[0].(api.RequestCtx)\n\treturn ret0\n}", "title": "" }, { "docid": "c748f871444be3ba94dcc1a1e817ad75", "score": "0.6388807", "text": "func (m *MockGitops_GetObjectsToSynchronizeServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "487a90c3d1cdb85700df1b7fc0807712", "score": "0.6352177", "text": "func (m *MockMessenger) Send(msg service.DIDCommMsgMap, myDID, theirDID string) error {\n\tm.lock.Lock()\n\tdefer m.lock.Unlock()\n\n\tm.lastID = msg.ID()\n\n\treturn nil\n}", "title": "" }, { "docid": "ed184aedea11dd76ebcdd6e650b4eea2", "score": "0.6337693", "text": "func (m *MockWorker_FetchDDLInfoClient) CloseSend() error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CloseSend\")\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "f52de91216863c0103428063f44da979", "score": "0.63094676", "text": "func (m *MockClient) SendMessage(msg []byte) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMessage\", msg)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "ac58fd8a84b4f5f463b524d0dca2c7b5", "score": "0.63093007", "text": "func (transport *MockOutboundTransport) Send(data, destination string) (string, error) {\n\tif data == \"\" || destination == \"\" {\n\t\treturn \"\", errors.New(\"data and destination are mandatory\")\n\t}\n\n\treturn transport.ExpectedResponse, nil\n}", "title": "" }, { "docid": "42be8373e5b93012f96959d50a65c201", "score": "0.63060975", "text": "func (m *MockHistoryService_StreamWorkflowReplicationMessagesClient) CloseSend() error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CloseSend\")\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "7c77b9f50cb985b0cbb06f4cf3bec77a", "score": "0.62787485", "text": "func (m *MockReverseTunnel_ConnectServer) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "d4efb1c49e1600f9905a2c04f7e7e853", "score": "0.6263227", "text": "func (_m *Publisher) Send(ctx context.Context, topic string, key string, headers eventbus.MessageHeaders, message []byte) error {\n\tret := _m.Called(ctx, topic, key, headers, message)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(context.Context, string, string, eventbus.MessageHeaders, []byte) error); ok {\n\t\tr0 = rf(ctx, topic, key, headers, message)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "d10c23a999414e98b1346bafce51c714", "score": "0.6262237", "text": "func (_m *Tracker) Send(analytics models.TrackEvent) error {\n\tret := _m.Called(analytics)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(models.TrackEvent) error); ok {\n\t\tr0 = rf(analytics)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "0c5a5748050b0d2286293b83d56485d8", "score": "0.624704", "text": "func (m_2 *MockHistoryService_StreamWorkflowReplicationMessagesClient) SendMsg(m interface{}) error {\n\tm_2.ctrl.T.Helper()\n\tret := m_2.ctrl.Call(m_2, \"SendMsg\", m)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "1a5d8035b024b2966dc85a3bf1053a05", "score": "0.6246416", "text": "func (_m *MockStreamI) SentFin() {\n\t_m.ctrl.Call(_m, \"SentFin\")\n}", "title": "" }, { "docid": "4021fcbbc45ad64dfb38a054b4e99132", "score": "0.624238", "text": "func (mock *tbAPIMock) SendCalls() []struct {\n\tC tbapi.Chattable\n} {\n\tvar calls []struct {\n\t\tC tbapi.Chattable\n\t}\n\tmock.lockSend.RLock()\n\tcalls = mock.calls.Send\n\tmock.lockSend.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "f34d60c3c24a1fc297ca1a3dcc18fe48", "score": "0.62381494", "text": "func (m *MockByteStream_WriteClient) SendMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "5cfd343c2455735b09e72f6d329e96a6", "score": "0.6224388", "text": "func (_m *PersonService_StoreServer) SendMsg(m interface{}) error {\n\tret := _m.Called(m)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(interface{}) error); ok {\n\t\tr0 = rf(m)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "3738e0a582454422b8459f5ba0ecbae9", "score": "0.6216854", "text": "func (m *HostNetworkMock) SendRequest(p context.Context, p1 types.PacketType, p2 interface{}, p3 insolar.Reference) (r network.Future, r1 error) {\n\tcounter := atomic.AddUint64(&m.SendRequestPreCounter, 1)\n\tdefer atomic.AddUint64(&m.SendRequestCounter, 1)\n\n\tif len(m.SendRequestMock.expectationSeries) > 0 {\n\t\tif counter > uint64(len(m.SendRequestMock.expectationSeries)) {\n\t\t\tm.t.Fatalf(\"Unexpected call to HostNetworkMock.SendRequest. %v %v %v %v\", p, p1, p2, p3)\n\t\t\treturn\n\t\t}\n\n\t\tinput := m.SendRequestMock.expectationSeries[counter-1].input\n\t\ttestify_assert.Equal(m.t, *input, HostNetworkMockSendRequestInput{p, p1, p2, p3}, \"HostNetwork.SendRequest got unexpected parameters\")\n\n\t\tresult := m.SendRequestMock.expectationSeries[counter-1].result\n\t\tif result == nil {\n\t\t\tm.t.Fatal(\"No results are set for the HostNetworkMock.SendRequest\")\n\t\t\treturn\n\t\t}\n\n\t\tr = result.r\n\t\tr1 = result.r1\n\n\t\treturn\n\t}\n\n\tif m.SendRequestMock.mainExpectation != nil {\n\n\t\tinput := m.SendRequestMock.mainExpectation.input\n\t\tif input != nil {\n\t\t\ttestify_assert.Equal(m.t, *input, HostNetworkMockSendRequestInput{p, p1, p2, p3}, \"HostNetwork.SendRequest got unexpected parameters\")\n\t\t}\n\n\t\tresult := m.SendRequestMock.mainExpectation.result\n\t\tif result == nil {\n\t\t\tm.t.Fatal(\"No results are set for the HostNetworkMock.SendRequest\")\n\t\t}\n\n\t\tr = result.r\n\t\tr1 = result.r1\n\n\t\treturn\n\t}\n\n\tif m.SendRequestFunc == nil {\n\t\tm.t.Fatalf(\"Unexpected call to HostNetworkMock.SendRequest. %v %v %v %v\", p, p1, p2, p3)\n\t\treturn\n\t}\n\n\treturn m.SendRequestFunc(p, p1, p2, p3)\n}", "title": "" }, { "docid": "231c74299cf0150e4b577008d83acd02", "score": "0.6211045", "text": "func (i *instance) Send(_ string, _ uint64, _ uint64, _ []byte) metadata.Contract {\n\treturn i.result\n}", "title": "" }, { "docid": "731cebc68dd1f74296013ae928f40fe1", "score": "0.620283", "text": "func testSend(t *testing.T, addr string) {\n\t// create a new link\n\tl := link.NewLink(\n\t\tlink.Address(addr),\n\t)\n\n\t// connect the link, this includes dialing\n\tif err := l.Connect(); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// create a tunnel on the link\n\ttun := NewTunnel(l)\n\n\t// connect the tunnel with the remote side\n\tif err := tun.Connect(); err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// dial a new session\n\tc, err := tun.Dial(\"test-tunnel\")\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\tm := transport.Message{\n\t\tHeader: map[string]string{\n\t\t\t\"test\": \"header\",\n\t\t},\n\t}\n\tif err := c.Send(&m); err != nil {\n\t\tt.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "5c4702d580ca92675946ac7d55b61cde", "score": "0.62011826", "text": "func (s mockServer) send(p semtech.Packet) semtech.Packet {\n\traw, err := p.MarshalBinary()\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\ts.conn.Write(raw)\n\tselect {\n\tcase packet := <-s.response:\n\t\treturn packet\n\tcase <-time.After(100 * time.Millisecond):\n\t\treturn semtech.Packet{}\n\t}\n}", "title": "" }, { "docid": "397b07cea033d41780106060382bc87b", "score": "0.61943537", "text": "func (_m *MockStreamI) UpdateSendWindow(_param0 protocol.ByteCount) {\n\t_m.ctrl.Call(_m, \"UpdateSendWindow\", _param0)\n}", "title": "" }, { "docid": "0acaa961df7c2055fa174c67cba8abef", "score": "0.6191742", "text": "func (m *MockReverseTunnel_ConnectClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "9fcbe0da80fb80c08c9ae8074fef152d", "score": "0.6173039", "text": "func (m *MockWorker_FetchDDLInfoServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "a107a4251d0b2ba86ca8ba0ae6774837", "score": "0.61719453", "text": "func (m *MockByteStream_ReadClient) SendMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "3f3883d61052961b25fe2ba3ee7819c4", "score": "0.61715084", "text": "func (mock *TransportMock) SendCalls() []struct {\n\tCtx context.Context\n\tEnv endpoint.OutboundEnvelope\n} {\n\tvar calls []struct {\n\t\tCtx context.Context\n\t\tEnv endpoint.OutboundEnvelope\n\t}\n\tlockTransportMockSend.RLock()\n\tcalls = mock.calls.Send\n\tlockTransportMockSend.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "d6edd22da4ee44353208a55ac4e6131e", "score": "0.6140224", "text": "func (m *mSenderMockSend) Set(f func(p context.Context, p1 *message.Message) (r <-chan *message.Message, r1 func())) *SenderMock {\n\tm.mainExpectation = nil\n\tm.expectationSeries = nil\n\n\tm.mock.SendFunc = f\n\treturn m.mock\n}", "title": "" }, { "docid": "282fa3a8a260b7f14c95fd44604bd609", "score": "0.6140134", "text": "func (mock *NotifierMock) SendCalls() []struct {\n\tVars map[string]string\n} {\n\tvar calls []struct {\n\t\tVars map[string]string\n\t}\n\tlockNotifierMockSend.RLock()\n\tcalls = mock.calls.Send\n\tlockNotifierMockSend.RUnlock()\n\treturn calls\n}", "title": "" }, { "docid": "fa0eedcac256abc2e98295d61d49ff53", "score": "0.6129471", "text": "func (_m *Client) Send(buffer *bytes.Buffer) {\n\t_m.Called(buffer)\n}", "title": "" }, { "docid": "a528d13d6a3a062336c47088ef986658", "score": "0.6122819", "text": "func (m *MockReverseTunnel_ConnectClient) CloseSend() error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CloseSend\")\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "795655c68a7b707a1be55a5f02d92311", "score": "0.61217797", "text": "func (_m *MockCollectionConfigService_GetConfigStreamClient) CloseSend() error {\n\tret := _m.Called()\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func() error); ok {\n\t\tr0 = rf()\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "befb1d0a1b92c0313567606232ed7929", "score": "0.6121445", "text": "func (m *MockIngester_IngestServer) SendHeader(arg0 metadata.MD) error {\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "55284ce7a380ba33807adad3ea4b5489", "score": "0.6116442", "text": "func (m *MockPongService_PingPongRPCClient) SendMsg(arg0 interface{}) error {\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "def444cf2aadf5497c7461e8afb8c2a1", "score": "0.6105524", "text": "func (m *MockRabbitExchange) SendTo(arg0, arg1 string, arg2, arg3 bool, arg4 string) rabbitevents.MessageHandleFunc {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendTo\", arg0, arg1, arg2, arg3, arg4)\n\tret0, _ := ret[0].(rabbitevents.MessageHandleFunc)\n\treturn ret0\n}", "title": "" }, { "docid": "cdc96aa13a8dbdc03e0a04ae25b68cd6", "score": "0.6096896", "text": "func TestSender(t *testing.T) {\n\t// mock the http request that get's sent subsequntialy\n\thttpmock.Activate()\n\tdefer httpmock.DeactivateAndReset()\n\n\t// Exact URL match\n\thttpmock.RegisterResponder(\"POST\", \"http://localhost:8082/receiver\",\n\t\thttpmock.NewStringResponder(200, \"OK\"))\n\n\t// test payload example\n\ttest_payload := `{\n\t\t\"to\" : [\n\t\t\t\t{\"email\": \"tobiasmahnert@gmail.com\"},\n\t\t\t\t{\"email\": \"tobiasmahnert@web.de\"}\n\t\t],\n\t\t\"from\" : {\n\t\t\t\"email_address_id\": 16426,\n\t\t\t\"name\": \"tobias\"\n\t\t},\n\t\t\"schedule\": 1624166184,\n\t\t\"subject\": \"test subject\",\n\t\t\"body\": \"test body\"\n\t}`\n\t// test sender request function\n\treq := httptest.NewRequest(http.MethodGet, \"/sender\", strings.NewReader(test_payload))\n\tw := httptest.NewRecorder()\n\tsender(w, req)\n\tres := w.Result()\n\tdefer res.Body.Close()\n\t_, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\tt.Errorf(\"expected error to be nil got %v\", err)\n\t}\n\tif httpmock.GetTotalCallCount() != 1 {\n\t\tt.Errorf(\"expected call count to be 1 got %v\", httpmock.GetTotalCallCount())\n\t}\n}", "title": "" }, { "docid": "bec8b61dcd38d1b35094c1d931aa476d", "score": "0.608721", "text": "func (m *MockChannel) SendMultiRequest(arg0 api.Message) api.MultiRequestCtx {\n\tret := m.ctrl.Call(m, \"SendMultiRequest\", arg0)\n\tret0, _ := ret[0].(api.MultiRequestCtx)\n\treturn ret0\n}", "title": "" }, { "docid": "80dc3049c0d977399b74f3ead4e26e0d", "score": "0.60773563", "text": "func (_m *MockConnectionFlowController) AddBytesSent(_param0 protocol.ByteCount) {\n\t_m.ctrl.Call(_m, \"AddBytesSent\", _param0)\n}", "title": "" }, { "docid": "04d301fdf646375de90009578500f32c", "score": "0.6073468", "text": "func (_m *MockConnectionFlowController) SendWindowSize() protocol.ByteCount {\n\tret := _m.ctrl.Call(_m, \"SendWindowSize\")\n\tret0, _ := ret[0].(protocol.ByteCount)\n\treturn ret0\n}", "title": "" }, { "docid": "d52afcb719ddf27f3bdc600e5cf90038", "score": "0.6052247", "text": "func (_m *MockCollectionConfigService_GetConfigStreamServer) SendMsg(m interface{}) error {\n\tret := _m.Called(m)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(interface{}) error); ok {\n\t\tr0 = rf(m)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "9c91b74b78694f521eff1ab6d285ccf2", "score": "0.60489035", "text": "func (m *MockTxEventService_OnConnectedClient) SendMsg(arg0 interface{}) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendMsg\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "68eca87d348a5aa1c37b4efa34d49588", "score": "0.6045485", "text": "func (m *MockPongService_PingPongRPCClient) CloseSend() error {\n\tret := m.ctrl.Call(m, \"CloseSend\")\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "0a4a9aeee418427e8a3276a747d63cf7", "score": "0.60170484", "text": "func (m *MockByteStream_WriteClient) CloseSend() error {\n\tret := m.ctrl.Call(m, \"CloseSend\")\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "031742a6bdd596f1fb2afc0d783cbda5", "score": "0.6016675", "text": "func (m *MockHistoryService_StreamWorkflowReplicationMessagesServer) SendHeader(arg0 metadata.MD) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendHeader\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "99f61fc052b957ae472928fd2fadf7a5", "score": "0.6007271", "text": "func (m *MockSessionHandler) execute(msg *dipper.Message) {\n\tm.ctrl.T.Helper()\n\tm.ctrl.Call(m, \"execute\", msg)\n}", "title": "" }, { "docid": "0edf09837ec8fdffaa113c473f444bfd", "score": "0.6004912", "text": "func (p *Provider) Send(method string, args ...interface{}) *jsonrpc.RPCResponse {\n\tresponse, err := p.client.Call(method, args...)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\treturn response\n}", "title": "" }, { "docid": "a39a9b1df39cf8679b2a4bfac9964906", "score": "0.597627", "text": "func (_m *TelemetryIngressBatchClient) Send(_a0 synchronization.TelemPayload) {\n\t_m.Called(_a0)\n}", "title": "" }, { "docid": "09c20aba20e2a6268c949295977efe40", "score": "0.5973401", "text": "func (m *MockServiceClient) SendAction(ctx context.Context, in *iotexapi.SendActionRequest, opts ...grpc.CallOption) (*iotexapi.SendActionResponse, error) {\n\tm.ctrl.T.Helper()\n\tvarargs := []interface{}{ctx, in}\n\tfor _, a := range opts {\n\t\tvarargs = append(varargs, a)\n\t}\n\tret := m.ctrl.Call(m, \"SendAction\", varargs...)\n\tret0, _ := ret[0].(*iotexapi.SendActionResponse)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "9cd54e29c5e7c223e8f2e69c357bd37d", "score": "0.597327", "text": "func TestSendListReq(t *testing.T) {\n\tprx := NewProxy(100)\n\tsMock1 := socketMock{}\n\terr := prx.SendList()\n\tif err == nil {\n\t\tt.Fatal(\"Cannot send list request when no socket set to proxy\")\n\t}\n\n\tprx.SetSocket(&sMock1)\n\terr = prx.SendList()\n\tif err == nil {\n\t\tt.Fatal(\"Cannot send list request when socket not identified\")\n\t}\n\tif len(sMock1.packets) > 0 {\n\t\tt.Fatal(\"Cannot send list request when socket not identified\")\n\t}\n\tsMock1.id = 12\n\terr = prx.SendList()\n\tif err != nil {\n\t\tt.Fatal(\"Error on send list request\")\n\t}\n\tif len(sMock1.packets) != 1 {\n\t\tt.Fatal(\"List request not sent to socket\")\n\t}\n}", "title": "" }, { "docid": "43b7664dbb18c68d43cc6d9bc9c0c216", "score": "0.59721124", "text": "func (m *MockTaskServerIface) SendGroup(arg0 *tasks.Group, arg1 int) ([]*result.AsyncResult, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendGroup\", arg0, arg1)\n\tret0, _ := ret[0].([]*result.AsyncResult)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" }, { "docid": "5060787ecb38a4759dc402f054e33f90", "score": "0.5967529", "text": "func (m *MockTransportInterface) SendToRadio(arg0 []byte) error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendToRadio\", arg0)\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "dc2f3f18a76c390641bda279ac1444b5", "score": "0.59648997", "text": "func (m *MockByteStream_ReadClient) CloseSend() error {\n\tret := m.ctrl.Call(m, \"CloseSend\")\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "e487e60fea215274cbc808b5660ce380", "score": "0.5962802", "text": "func (a *testProbe) Send(pid *actor.PID, message interface{}) {\n\ta.system.Root.Send(pid, message)\n}", "title": "" }, { "docid": "aeb381ee095ea4642793c99b3a9e5396", "score": "0.5959981", "text": "func (_m *MockConnectionFlowController) UpdateSendWindow(_param0 protocol.ByteCount) {\n\t_m.ctrl.Call(_m, \"UpdateSendWindow\", _param0)\n}", "title": "" }, { "docid": "cc4aeb00c783a67d10dd380ad23c1133", "score": "0.59432036", "text": "func (_m *BtcIndexer_SyncStream) SendMsg(_a0 interface{}) error {\n\tret := _m.Called(_a0)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(interface{}) error); ok {\n\t\tr0 = rf(_a0)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "3c01b98dff744e4604f07e64e87a2850", "score": "0.59159875", "text": "func (m *MockContext) Sender() *actor.PID {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"Sender\")\n\tret0, _ := ret[0].(*actor.PID)\n\treturn ret0\n}", "title": "" }, { "docid": "dd7e7f0ac8cd50448ee54bc3493277cc", "score": "0.59009045", "text": "func (_m *MockCollectionConfigService_GetConfigStreamClient) SendMsg(m interface{}) error {\n\tret := _m.Called(m)\n\n\tvar r0 error\n\tif rf, ok := ret.Get(0).(func(interface{}) error); ok {\n\t\tr0 = rf(m)\n\t} else {\n\t\tr0 = ret.Error(0)\n\t}\n\n\treturn r0\n}", "title": "" }, { "docid": "2e878f417ae6dbd4060d9455d9d8918a", "score": "0.5900883", "text": "func tester_send() {\n address_0 := \"1029 North Jackon St\"\n name := \"John Smith\"\n email := \"john.smith@gmail.com\"\n phone := \"999.999.9999\"\n send(address_0,name,email,phone)\n}", "title": "" }, { "docid": "f5a569c0701d3987d4aadf55be3b926c", "score": "0.59003127", "text": "func (m *MockTxEventService_OnConnectedClient) CloseSend() error {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"CloseSend\")\n\tret0, _ := ret[0].(error)\n\treturn ret0\n}", "title": "" }, { "docid": "4e418ddaa02c23401d21b19be7645c72", "score": "0.589905", "text": "func (m *MockInterface) SendImg(chatID int64, img []byte, caption string, keyboard [][]model.KV) (int, error) {\n\tm.ctrl.T.Helper()\n\tret := m.ctrl.Call(m, \"SendImg\", chatID, img, caption, keyboard)\n\tret0, _ := ret[0].(int)\n\tret1, _ := ret[1].(error)\n\treturn ret0, ret1\n}", "title": "" } ]
5c4537e0f77afb0bc5ef832fb462c2f4
GetNested returns all keys under specific key
[ { "docid": "47a64d280268f4b94842a97c40719ab8", "score": "0.5896326", "text": "func GetNested(key string) *Config {\n\tnested := viper.Sub(key)\n\tif nested == nil {\n\t\treturn nil\n\t}\n\n\treturn &Config{configs: nested}\n}", "title": "" } ]
[ { "docid": "d75fe234dd112be020d76f45d3065ff0", "score": "0.57297087", "text": "func (p *pinner) RecursiveKeys() []util.Key {\n\treturn p.recursePin.GetKeys()\n}", "title": "" }, { "docid": "115b46daf43dadcd2adbe48fe7aaac73", "score": "0.5561257", "text": "func (f BodyField) getNestedMap(currentMap map[string]interface{}, key string) map[string]interface{} {\n\tcurrentValue, ok := currentMap[key]\n\tif !ok {\n\t\tcurrentMap[key] = map[string]interface{}{}\n\t}\n\n\tnextMap, ok := currentValue.(map[string]interface{})\n\tif !ok {\n\t\tnextMap = map[string]interface{}{}\n\t\tcurrentMap[key] = nextMap\n\t}\n\n\treturn nextMap\n}", "title": "" }, { "docid": "bfffd9bbe48e09632a7cb0abe622ca57", "score": "0.5533863", "text": "func getNestedMap(currentMap map[string]interface{}, key string) map[string]interface{} {\n\tcurrentValue, ok := currentMap[key]\n\tif !ok {\n\t\tcurrentMap[key] = map[string]interface{}{}\n\t}\n\n\tnextMap, ok := currentValue.(map[string]interface{})\n\tif !ok {\n\t\tnextMap = map[string]interface{}{}\n\t\tcurrentMap[key] = nextMap\n\t}\n\n\treturn nextMap\n}", "title": "" }, { "docid": "c840ac2dbc875388f3f4f54eedc39ed3", "score": "0.5484137", "text": "func RetrieveNestedProperty(jobSpec manifest.JobSpec, propertyName string) map[string]interface{} {\n\tvar anStruct map[string]interface{}\n\tvar previous map[string]interface{}\n\titems := strings.Split(propertyName, \".\")\n\tfor i := len(items) - 1; i >= 0; i-- {\n\t\tif i == (len(items) - 1) {\n\t\t\tprevious = map[string]interface{}{\n\t\t\t\titems[i]: RetrievePropertyDefault(jobSpec, propertyName),\n\t\t\t}\n\t\t} else {\n\t\t\tanStruct = map[string]interface{}{\n\t\t\t\titems[i]: previous,\n\t\t\t}\n\t\t\tprevious = anStruct\n\n\t\t}\n\t}\n\treturn anStruct\n}", "title": "" }, { "docid": "f3eb32047f8da49791143c894b131092", "score": "0.5447826", "text": "func (c *Client) Get(key string) (string, error) {\n\tc.lock.Lock()\n\tresp, err := c.API.Get(context.Background(), \"/\"+key, &client.GetOptions{\n\t\tRecursive: true,\n\t})\n\tc.lock.Unlock()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tvar res []string\n\tfor index := range resp.Node.Nodes {\n\t\tres = append(res, strings.Split(resp.Node.Nodes[index].Key, \"/\")[2])\n\t}\n\tjson, _ := json.Marshal(res)\n\treturn string(json), nil\n}", "title": "" }, { "docid": "7cc10df071ebdce57697bcd65298f913", "score": "0.53019285", "text": "func findObjectWithKey(root interface{}, key string) interface{} {\n // if (typeof root !== 'object') {\n // return;\n // }\n\n switch root.(type) {\n default:\n \treturn nil\n case []interface{}:\n \tfor _, item := range root.([]interface{}) {\n \t\tanswer := findObjectWithKey(item, key)\n \t\tif answer != nil {\n \t\t\treturn answer\n \t\t}\n \t}\n case map[string]interface{}:\n }\n \n if _, ok := root.(map[string]interface{})[key]; ok {\n\t\t\n\t\treturn root\n\t}\n\n\tfor subkey, _ := range root.(map[string]interface{}) {\n\t\tanswer := findObjectWithKey(root.(map[string]interface{})[subkey], key)\n\t\tif answer != nil {\n\t\t\treturn answer\n\t\t}\n\t}\n \n return nil\n}", "title": "" }, { "docid": "48c66d2dc60ffa14d519bbe9a162ddb6", "score": "0.52801955", "text": "func flattenKey(c *Client, i interface{}, res *Key) *Key {\n\tm, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn nil\n\t}\n\tif len(m) == 0 {\n\t\treturn nil\n\t}\n\n\tresultRes := &Key{}\n\tresultRes.Name = dcl.SelfLinkToName(dcl.FlattenString(m[\"name\"]))\n\tresultRes.DisplayName = dcl.FlattenString(m[\"displayName\"])\n\tresultRes.WebSettings = flattenKeyWebSettings(c, m[\"webSettings\"], res)\n\tresultRes.AndroidSettings = flattenKeyAndroidSettings(c, m[\"androidSettings\"], res)\n\tresultRes.IosSettings = flattenKeyIosSettings(c, m[\"iosSettings\"], res)\n\tresultRes.Labels = dcl.FlattenKeyValuePairs(m[\"labels\"])\n\tresultRes.CreateTime = dcl.FlattenString(m[\"createTime\"])\n\tresultRes.TestingOptions = flattenKeyTestingOptions(c, m[\"testingOptions\"], res)\n\tresultRes.Project = dcl.FlattenString(m[\"project\"])\n\n\treturn resultRes\n}", "title": "" }, { "docid": "0978ec87f50a4dfe93978170b2097263", "score": "0.5124317", "text": "func (fcs *etcdStruct) GetAll() ([]KeyValue, error) {\n\tprefix := fcs.prefix\n\tif len(prefix) == 0 {\n\t\tprefix = \"/\"\n\t}\n\n\tresp, err := fcs.client.Get(context.Background(),\n\t\tprefix, etcd.WithPrefix())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Iterate through the response creating a KeyValue structure for\n\t// every property found. The returned keys will have the prefix\n\t// stripped if a prefix was set when the store was created.\n\tvar result []KeyValue\n\tfor _, n := range resp.Kvs {\n\t\tkey := string(n.Key)\n\t\tif strings.HasPrefix(key, prefix) {\n\t\t\tkey = key[len(prefix):]\n\t\t}\n\n\t\tif strings.HasPrefix(key, \"/\") {\n\t\t\tkey = key[1:]\n\t\t}\n\n\t\tresult = append(result,\n\t\t\tKeyValue{Key: slashToDots(key), Value: string(n.Value)})\n\t}\n\n\treturn result, nil\n}", "title": "" }, { "docid": "567c643af568bf1e9e469dd37aa07d50", "score": "0.5081132", "text": "func possibleSubKeys(keyPath string, cfg *yaml.Tree) (list []string, err error) {\n\tvar value *yaml.Tree\n\tvar query string\n\n\tif keyPath != \"\" {\n\t\tparentPath := strings.Split(keyPath, \".\")\n\t\tif len(parentPath) > 0 {\n\t\t\t// offer suggestions based on this query\n\t\t\tquery = parentPath[len(parentPath)-1]\n\t\t\tif _, err := strconv.Atoi(query); err != nil {\n\t\t\t\tparentPath = parentPath[:len(parentPath)-1]\n\t\t\t}\n\t\t\tlog.Debugf(\"Querying for %s in %s\", query, parentPath)\n\t\t}\n\n\t\tif len(parentPath) > 0 {\n\t\t\terr = cfg.Get(strings.Join(parentPath, \".\"), &value)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t} else {\n\n\t\t\tvalue = cfg\n\t\t}\n\t} else {\n\t\tvalue = cfg\n\t}\n\n\tlog.Debugf(\"Query: %s\", query)\n\tif value.IsSlice() {\n\t\ttheList := make([]interface{}, 0)\n\t\tif err = value.Decode(&theList); err != nil {\n\t\t\treturn\n\t\t}\n\n\t\tfor keyInt, value := range theList {\n\t\t\tkey := mappedKey(strconv.Itoa(keyInt), value)\n\t\t\tlist = append(list, key)\n\t\t}\n\t} else if value.IsMap() {\n\t\ttheMap := map[string]interface{}{}\n\t\tif err = value.Decode(&theMap); err != nil {\n\t\t\treturn\n\t\t}\n\t\tfor key, value := range theMap {\n\t\t\tif query != \"\" && !strings.HasPrefix(strings.ToLower(key), strings.ToLower(query)) {\n\t\t\t\tlog.Debugf(\"Skipping %s\", key)\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tkey = mappedKey(key, value)\n\t\t\tlist = append(list, key)\n\t\t}\n\t}\n\n\tsort.Strings(list)\n\treturn\n}", "title": "" }, { "docid": "e019a08de87c633515028b6e15d59e81", "score": "0.5008805", "text": "func GetAllSecretFromParent(path string) map[string]interface{} {\n\tif strings.Contains(path, \"/\") {\n\t\t// GetAllSecretFromParent path doesn't contain '/'\n\t\tlog.Error( \"GetAllSecretFromParent path can not contain '/', path=\", path)\n\n\t}\n\tconfig := api.Config{Address: vaultAddr}\n\tclient, err := api.NewClient(&config)\n\tif err != nil {\n\t\tlog.Error(err)\n\t}\n\tclient.SetToken(vaultToken)\n\n\tpath = path + \"/metadata/\"\n\n\t//log.Info(\"path: \", path)\n\n\tsecrets, err := client.Logical().List(path)\n\tif err != nil {\n\t\tlog.Error(err)\n\t}\n\n\tif secrets == nil {\n\t\tlog.Error( \"List secrets: \", secrets)\n\t}\n\tif secrets.Data == nil {\n\t\tlog.Error( \"List secrets: \", secrets)\n\t\tlog.Error( \"Can not retrieve secret list, secrets.Data: \", secrets.Data)\n\t}\n\t//fmt.Printf(\"\\nkeys list: %s\\n\", secrets.Data[\"keys\"])\n\n\tparentSecretMap := make(map[string]interface{})\n\tfor _,v := range secrets.Data[\"keys\"].([]interface{}){\n\t\tsecretMap := GetAllSecretFromPath(path + v.(string))\n\t\tparentSecretMap[v.(string)] = secretMap\n\t}\n\tparentSecretJson, err := json.MarshalIndent(parentSecretMap, \"\", \" \")\n\tif err != nil {\n\t\tlog.Error(err)\n\t}\n\tfmt.Println(string(parentSecretJson))\n\n\treturn parentSecretMap\n}", "title": "" }, { "docid": "e959aedd6003b02bd0a2982c3a67b53b", "score": "0.4970405", "text": "func (k Keeper) GetProductsFromDepthBookMap() []string {\n\treturn k.diskCache.getProductsFromDepthBookMap()\n}", "title": "" }, { "docid": "73831c001bd2bb78e79481533436bdd2", "score": "0.4925121", "text": "func (err Error) GetNested() []NestedError {\n\tchildren, ok := err.Nested.([]NestedError)\n\tif !ok {\n\t\tchildren = []NestedError{}\n\t\tif err.Nested != nil {\n\t\t\tchildren = append(children, err.Nested)\n\t\t}\n\t}\n\n\treturn children\n}", "title": "" }, { "docid": "bf1012904b94a51bff1cfaa9056b4f19", "score": "0.489576", "text": "func getHelper(\n\tnode patricia, key []byte, prefix int, dao db.KVStore, bucket string, cb db.CachedBatch) ([]byte, error) {\n\t// parse the key and get child node\n\tchild, match, err := node.child(key[prefix:], dao, bucket, cb)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(ErrNotExist, \"key = %x\", key)\n\t}\n\tif child == nil {\n\t\t// this is the last node on path, return its stored value\n\t\treturn node.blob(key)\n\t}\n\t// continue get() on child node\n\treturn getHelper(child, key, prefix+match, dao, bucket, cb)\n}", "title": "" }, { "docid": "20c7263bffdc9527910f39d5090e72b5", "score": "0.48700345", "text": "func (tjson *TJSON) Get(key string, defaultValue interface{}) interface{} {\n\tvar (\n\t\tpaths = strings.Split(key, \".\")\n\t\tre = regexp.MustCompile(`(.*)\\[(\\d+)\\]$`)\n\t\tthisJSON interface{} = tjson.json\n\t\tkeys []string\n\t)\n\tfor _, path := range paths {\n\t\tif len(path) == 0 {\n\t\t\tcontinue\n\t\t}\n\t\tif subPath, ok := thisJSON.(map[string]interface{}); ok {\n\t\t\tkeys = re.FindStringSubmatch(path)\n\t\t\tif len(keys) != 3 {\n\t\t\t\t// !array\n\t\t\t\tif value, exists := subPath[path]; exists {\n\t\t\t\t\tthisJSON = value\n\t\t\t\t} else {\n\t\t\t\t\treturn defaultValue\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tif value, exists := subPath[keys[1]]; exists {\n\t\t\t\t\t// need arrIdx is type of int\n\t\t\t\t\t// as index of array must be int, so when it's not an int,\n\t\t\t\t\t// will treat it as an error, nil will return\n\t\t\t\t\tarrIdx, err := strconv.Atoi(keys[2])\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t}\n\t\t\t\t\tif subPath, ok := value.([]interface{}); ok {\n\t\t\t\t\t\t// need to check the range\n\t\t\t\t\t\t// out of range is not an error\n\t\t\t\t\t\tif len(subPath) <= arrIdx {\n\t\t\t\t\t\t\treturn defaultValue\n\t\t\t\t\t\t}\n\t\t\t\t\t\tthisJSON = subPath[arrIdx]\n\t\t\t\t\t} else {\n\t\t\t\t\t\treturn nil\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\treturn defaultValue\n\t\t\t\t}\n\t\t\t}\n\t\t} else if subPath, ok := thisJSON.(map[interface{}]interface{}); ok {\n\t\t\tif value, exists := subPath[path]; exists {\n\t\t\t\tthisJSON = value\n\t\t\t} else {\n\t\t\t\treturn defaultValue\n\t\t\t}\n\t\t} else {\n\t\t\treturn defaultValue\n\t\t}\n\t}\n\treturn thisJSON\n}", "title": "" }, { "docid": "585c9c6d88eb824dba3ada8862b5ef7e", "score": "0.48518616", "text": "func Example_nestedStruct() {\n\tverbose := flag.Bool(\"verbose\", false, \"Verbose\")\n\tnode := flag.String(\"node\", \"\", \"Etcd node\")\n\tport := flag.String(\"port\", \"\", \"Etcd port\")\n\tflag.Parse()\n\n\t// Define nested structure.\n\tg := Group{\n\t\tName: \"staff\",\n\t\tUsers: []User{\n\t\t\tUser{\n\t\t\t\tName: \"jdoe\",\n\t\t\t\tAge: 25,\n\t\t\t\tMale: true,\n\t\t\t\tFirstName: \"John\",\n\t\t\t\tLastName: \"Doe\",\n\t\t\t},\n\t\t\tUser{\n\t\t\t\tName: \"lnemoy\",\n\t\t\t\tAge: 62,\n\t\t\t\tMale: true,\n\t\t\t\tFirstName: \"Leonard\",\n\t\t\t\tLastName: \"Nimoy\",\n\t\t\t},\n\t\t},\n\t}\n\n\t// Connect to Etcd.\n\tconn := getEnv()\n\tif node == nil && port == nil {\n\t\tconn = []string{fmt.Sprintf(\"http://%v:%v\", *node, *port)}\n\t}\n\n\tif *verbose {\n\t\tlog.Printf(\"Connecting to: %s\", conn)\n\t}\n\tclient := etcd.NewClient(conn)\n\n\t// Create directory structure based on struct.\n\terr := etcdmap.Create(client, \"/example\", reflect.ValueOf(g))\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t}\n\n\t// Get directory structure from Etcd.\n\tres, err := client.Get(\"/example\", true, true)\n\tif err != nil {\n\t\tlog.Fatal(err.Error())\n\t}\n\n\tj, err2 := etcdmap.JSON(res.Node)\n\tif err2 != nil {\n\t\tlog.Fatal(err2.Error())\n\t}\n\n\tfmt.Println(string(j))\n\n\t// Output:\n\t//{\"id\":\"staff\",\"users\":{\"0\":{\"age\":\"25\",\"first_name\":\"John\",\"id\":\"jdoe\",\"last_name\":\"Doe\",\"male\":\"true\"},\"1\":{\"age\":\"62\",\"first_name\":\"Leonard\",\"id\":\"lnemoy\",\"last_name\":\"Nimoy\",\"male\":\"true\"}}}\n}", "title": "" }, { "docid": "960ca4ab1edfabcc945588b23bb39a38", "score": "0.48344195", "text": "func (k *KeyValue) GetSubMap(keys ...string) (kv *KeyValue, err error) {\n\tresp, err := iterateToKey(k.Raw, keys, k.CaseInsensitive)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tkv = &KeyValue{Raw: resp}\n\treturn\n}", "title": "" }, { "docid": "4d8f89c1a22195fc86cfcb90f6b96233", "score": "0.48235947", "text": "func nestMap(fMap FieldMap) FieldMap {\n\tres := make(FieldMap)\n\tnested := make(map[string]FieldMap)\n\tfor k, v := range fMap {\n\t\texprs := strings.Split(k, ExprSep)\n\t\tif len(exprs) == 1 {\n\t\t\t// We are in the top map here\n\t\t\tres[k] = v\n\t\t\tcontinue\n\t\t}\n\t\tif _, exists := nested[exprs[0]]; !exists {\n\t\t\tnested[exprs[0]] = make(FieldMap)\n\t\t}\n\t\tnested[exprs[0]][strings.Join(exprs[1:], ExprSep)] = v\n\t}\n\t// Get nested FieldMap and assign to top key\n\tfor k, fm := range nested {\n\t\tres[k] = fm\n\t}\n\treturn res\n}", "title": "" }, { "docid": "4d8f89c1a22195fc86cfcb90f6b96233", "score": "0.48235947", "text": "func nestMap(fMap FieldMap) FieldMap {\n\tres := make(FieldMap)\n\tnested := make(map[string]FieldMap)\n\tfor k, v := range fMap {\n\t\texprs := strings.Split(k, ExprSep)\n\t\tif len(exprs) == 1 {\n\t\t\t// We are in the top map here\n\t\t\tres[k] = v\n\t\t\tcontinue\n\t\t}\n\t\tif _, exists := nested[exprs[0]]; !exists {\n\t\t\tnested[exprs[0]] = make(FieldMap)\n\t\t}\n\t\tnested[exprs[0]][strings.Join(exprs[1:], ExprSep)] = v\n\t}\n\t// Get nested FieldMap and assign to top key\n\tfor k, fm := range nested {\n\t\tres[k] = fm\n\t}\n\treturn res\n}", "title": "" }, { "docid": "75a91373304f4bf124c64d8c30803646", "score": "0.47189978", "text": "func Flatten(nested map[string]interface{}) (flatmap map[string]interface{}, err error) {\n\treturn flatten(\"\", nested)\n}", "title": "" }, { "docid": "b0cc990b3a6a8da03e47e14a8157ab46", "score": "0.46585175", "text": "func NestedField(obj *unstructured.Unstructured, name, path string) (interface{}, bool, error) {\n\tj := jsonpath.New(name).AllowMissingKeys(true)\n\ttemplate := fmt.Sprintf(\"{%s}\", path)\n\terr := j.Parse(template)\n\tif err != nil {\n\t\treturn nil, false, err\n\t}\n\tresults, err := j.FindResults(obj.UnstructuredContent())\n\tif err != nil {\n\t\treturn nil, false, err\n\t}\n\tif len(results) == 0 || len(results[0]) == 0 {\n\t\treturn nil, false, nil\n\t}\n\t// The input path refers to a unique field, we can assume to have only one result or none.\n\tvalue := results[0][0].Interface()\n\treturn value, true, nil\n}", "title": "" }, { "docid": "f37cbdd8f320d7bccd20affcf697dad6", "score": "0.4653179", "text": "func Flatten(nested map[string]interface{}, prefix string, style SeparatorStyle) (map[string]interface{}, error) {\n\tflatmap := make(map[string]interface{})\n\n\terr := flatten(true, flatmap, nested, prefix, style)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn flatmap, nil\n}", "title": "" }, { "docid": "02a1ae032966293f1911abb994e48390", "score": "0.46356505", "text": "func (trieInst *Trie) Get(key string) (interface{}, error) {\n\tif err := trieInst.checkKey(key); err != nil {\n\t\treturn nil, err\n\t}\n\n\ttr := trieInst\n\tfor _, char := range key {\n\t\ttr.rw.RLock()\n\t\t_, _, subTrie := tr.getSubTrie(char)\n\t\ttr.rw.RUnlock()\n\n\t\tif subTrie == nil {\n\t\t\treturn nil, nil\n\t\t}\n\n\t\ttr = subTrie\n\t}\n\n\ttr.rw.RLock()\n\tret := tr.data\n\ttr.rw.RUnlock()\n\n\treturn ret, nil\n}", "title": "" }, { "docid": "621721435021e172eab436366f2c04e6", "score": "0.46351388", "text": "func GetKeys(json []byte, path ...string) ([]string, error) {\n\tvar keys []string\n\tif string(json) == \"{}\" {\n\t\treturn nil, ErrEmpty()\n\t}\n\tvar start int\n\tvar err error\n\tif len(path) == 0 {\n\t\tfor space(json[start]) {\n\t\t\tif start > len(json)-1 {\n\t\t\t\treturn nil, ErrBadJSON(start)\n\t\t\t}\n\t\t\tstart++\n\t\t\tcontinue\n\t\t}\n\t} else {\n\t\t_, start, _, err = core(json, true, path...)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\tchars := []byte{34, 44, 58, 91, 93, 123, 125}\n\tisJSONChar := make([]bool, 256)\n\tfor _, v := range chars {\n\t\tisJSONChar[v] = true\n\t}\n\tif json[start] == 123 {\n\t\tkeyStart := 0\n\t\tkeyEnd := 0\n\t\tinQuote := false\n\t\tlevel := 0\n\t\tfor i := start; i < len(json); i++ {\n\t\t\tcurr := json[i]\n\t\t\tif !isJSONChar[curr] {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif curr == 34 {\n\t\t\t\tif inQuote {\n\t\t\t\t\tfor n := i - 1; n > -1; n-- {\n\t\t\t\t\t\tif json[n] != 92 {\n\t\t\t\t\t\t\tif (i-n)%2 != 0 {\n\t\t\t\t\t\t\t\tinQuote = !inQuote\n\t\t\t\t\t\t\t\tbreak\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tgoto cont\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tinQuote = !inQuote\n\t\t\t\t}\n\t\t\t\tif inQuote {\n\t\t\t\t\tkeyStart = i\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tkeyEnd = i\n\t\t\tcont:\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif inQuote {\n\t\t\t\tcontinue\n\t\t\t} else {\n\t\t\t\tif curr == 91 || curr == 123 {\n\t\t\t\t\tlevel++\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif curr == 93 || curr == 125 {\n\t\t\t\t\tif level == 1 {\n\t\t\t\t\t\tbreak\n\t\t\t\t\t}\n\t\t\t\t\tlevel--\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tif curr == 58 {\n\t\t\t\t\tif level == 1 {\n\t\t\t\t\t\tkey := json[keyStart+1 : keyEnd]\n\t\t\t\t\t\tkeys = append(keys, string(key))\n\t\t\t\t\t}\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\treturn keys, nil\n\t}\n\treturn nil, ErrObjectExpected()\n}", "title": "" }, { "docid": "b16924d75ae2e616cbbdf9173017b7ca", "score": "0.46285525", "text": "func (n *node) get(key Item, ctx interface{}) Item {\n\ti, found := n.items.find(key, ctx)\n\tif found {\n\t\treturn n.items[i]\n\t} else if len(n.children) > 0 {\n\t\treturn n.children[i].get(key, ctx)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "c502cd5d912ada911948dec2c838ed69", "score": "0.46150604", "text": "func GetWithPrefix(config *EtcdConfig, key string) ([]KeyInfo, error) {\n\tindex, client, err := getClient(config)\n\tif err != nil {\n\t\tfmt.Println(\"put action failed\")\n\t\treturn nil, err\n\t}\n\tKV := client.KV\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second*10)\n\tdefer cancel()\n\tr, err := KV.Get(ctx, key, clientv3.WithPrefix())\n\tif err != nil {\n\t\t_ = closeClient(index)\n\t\treturn nil, err\n\t}\n\tfmt.Println(\"get action succeed\")\n\tvar res []KeyInfo\n\tfor _, kv := range r.Kvs {\n\t\tKey := string(kv.Key)\n\t\tValue := string(kv.Value)\n\t\tModeRevision := int(kv.ModRevision)\n\t\tres = append(res, KeyInfo{Key, Value, ModeRevision})\n\t}\n\treturn res, nil\n}", "title": "" }, { "docid": "6a971263f82a33ab2fcef3e56ae07c54", "score": "0.46035546", "text": "func unnestFieldsN(l map[string]interface{}, depth int) map[string]interface{} {\n\tresult := map[string]interface{}{}\n\tmarshaledJSON, _ := json.Marshal(l)\n\tjson.Unmarshal(marshaledJSON, &result)\n\n\tif depth == 0 {\n\t\treturn result\n\t}\n\tfor k, v := range result {\n\t\tv, ok := v.(map[string]interface{})\n\t\tif ok {\n\t\t\tv := unnestFieldsN(v, depth-1)\n\t\t\tfor kk, vv := range v {\n\t\t\t\tnewK := fmt.Sprintf(\"%s.%s\", k, kk)\n\t\t\t\tresult[newK] = vv\n\t\t\t}\n\t\t\tdelete(result, k)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "b6bb5545ee72ab403a04c36820567bbe", "score": "0.45988733", "text": "func (m *OrderedMap) GetAll(key string) []string {\n\tif key == \"\" {\n\t\treturn nil\n\t}\n\n\tkeyVals := []string{}\n\tfor _, param := range m.keypairs {\n\t\t// Only build up our list of params for OUR key\n\t\tparamKey := param[0]\n\t\tif key == paramKey {\n\t\t\tkeyVals = append(keyVals, param[1])\n\t\t}\n\t}\n\treturn keyVals\n}", "title": "" }, { "docid": "442973dd29515fceadd63a9df091ce93", "score": "0.4596733", "text": "func (d *Driver) getKeys(ctx context.Context, prefix string, sortResults bool) ([]string, error) {\n\twatcher, err := d.kv.Watch(prefix, nats.MetaOnly(), nats.IgnoreDeletes(), nats.Context(ctx))\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer func() {\n\t\terr := watcher.Stop()\n\t\tif err != nil {\n\t\t\tlogrus.Warnf(\"failed to stop %s getKeys watcher\", prefix)\n\t\t}\n\t}()\n\n\tvar keys []string\n\t// grab all matching keys immediately\n\tfor entry := range watcher.Updates() {\n\t\tif entry == nil {\n\t\t\tbreak\n\t\t}\n\t\tkeys = append(keys, entry.Key())\n\t}\n\n\tif sortResults {\n\t\tsort.Strings(keys)\n\t}\n\n\treturn keys, nil\n}", "title": "" }, { "docid": "63eee2061bd20d64016e9996b9ceaf2d", "score": "0.45898974", "text": "func readConsulTree(key string) tree {\n\tvalues := tree{}\n\n\t// try to find values in key given, else take all values\n\tpairs, _, err := kv.List(srcKey, &consul.QueryOptions{})\n\tif err != nil {\n\t\tlog.Fatalf(\"Error retrieving data for specified key, %s => {%s}\", srcKey, err)\n\t} else if len(pairs) == 0 {\n\t\tlog.Fatalf(\"Failed to find any data, %s\", srcKey)\n\t}\n\n\t// determine how many characters from the start of the key to skip\n\tbase := path.Base(key)\n\tskip := len(key) - len(base)\n\n\tvalues.build(pairs, skip)\n\n\treturn values\n}", "title": "" }, { "docid": "8316bb17315c0f25b21923b4e4b9e3ff", "score": "0.45815444", "text": "func (c *KVClient) hierarchicalKeySearch(tx Transaction, key []byte, splitOn []byte) ([]byte, error) {\n\tif pieces := bytes.Split(key, splitOn); len(pieces) >= 2 {\n\t\tprefix := bytes.Join(pieces[0:2], splitOn)\n\t\tv, err := tx.Get(TablePackages, prefix)\n\t\tif err != nil && err != ErrKeyNotFound {\n\t\t\treturn nil, err\n\t\t} else if len(v) > 0 {\n\t\t\treturn v, nil\n\t\t}\n\t\tfor _, piece := range pieces[2:] {\n\t\t\tprefix = append(prefix, append(splitOn, piece...)...)\n\t\t\tif v, err = tx.Get(TablePackages, prefix); err != nil && err != ErrKeyNotFound {\n\t\t\t\treturn nil, err\n\t\t\t} else if len(v) > 0 {\n\t\t\t\treturn v, nil\n\t\t\t}\n\t\t}\n\t}\n\treturn nil, ErrKeyNotFound\n}", "title": "" }, { "docid": "cdbfdf6920e4a9c8376b3e61b76e703c", "score": "0.45735216", "text": "func (m *MetadataCachedS3Backend) findKey(node *gproto.NodeMetadata, paths []string, level int) *gproto.NodeMetadata {\n\t// If listing the root path, return the root cache\n\tif level == 1 && len(paths) == 1 && paths[0] == \"\" {\n\t\treturn node\n\t}\n\n\tif !node.GetDirectory() {\n\t\treturn nil\n\t}\n\n\tcurrentPath := paths[level-1]\n\n\tchild, ok := node.Children[currentPath]\n\tif !ok {\n\t\treturn nil\n\t}\n\n\tif len(paths) == level {\n\t\treturn child\n\t}\n\n\treturn m.findKey(child, paths, level+1)\n}", "title": "" }, { "docid": "27e7cff4efb31a004b73146887f12a3b", "score": "0.4566619", "text": "func getObject (schema map[string]interface{}, objName string) (map[string]interface{}) {\r\n // return a copy of the selected object\r\n // handles full path, or path starting after definitions\r\n if !strings.HasPrefix(objName, \"#/definitions/\") {\r\n objName = \"#/definitions/\" + objName\r\n } \r\n s := strings.Split(objName, \"/\")\r\n // crawl the levels, skipping the # root\r\n for i := 1; i < len(s); i++ {\r\n props, found := (schema[\"properties\"]).(map[string]interface{})\r\n if found {\r\n schema, found = (props[s[i]]).(map[string]interface{})\r\n } else {\r\n schema, found = (schema[s[i]]).(map[string]interface{})\r\n }\r\n if !found {\r\n fmt.Printf(\"schema[s[i]] called %s looks like: %+v\\n\", objName, schema[s[i]])\r\n fmt.Printf(\"** ERR ** getObject illegal selector %s at level %d called %s\\n\", objName, i, s[i])\r\n return nil\r\n }\r\n }\r\n return schema\r\n}", "title": "" }, { "docid": "c51c6dadee9b7ead6e7932c2419c46f7", "score": "0.45664212", "text": "func complexKeys(m map[string]map[string]string) []string {\n\tvar keys []string\n\tfor k := range m {\n\t\tkeys = append(keys, k)\n\t}\n\treturn keys\n}", "title": "" }, { "docid": "cd5694baa19634745df432ce51145ad6", "score": "0.4561165", "text": "func (db *DB) Get(key *dt.Slice) *dt.Slice{\n\tnode := db._table.Find(key.Data())\n\tif node == nil{\n\t\treturn nil\n\t}\n\tkeyValueSlice := dt.NewSlice(node.Get())\n\tkeyValueData := keyValueSlice.Data()\n\tvar keySize = binary.BigEndian.Uint32(keyValueData[0:4])\n\t//var valueSize = binary.BigEndian.Uint32(keyValueData[4+keySize: 8+keySize])\n\tvar value = keyValueData[8+keySize:]\n\treturn dt.NewSlice(value)\n}", "title": "" }, { "docid": "292d511e0e2f01df0074c7bd86cb327b", "score": "0.45512074", "text": "func GetNestedSlice(obj *unstructured.Unstructured, fields ...string) ([]interface{}, error) {\n\tnestedSlice, found, err := unstructured.NestedSlice(obj.Object, fields...)\n\tif err != nil || !found {\n\t\treturn nil, err\n\t}\n\treturn nestedSlice, nil\n}", "title": "" }, { "docid": "fcba558b3167303197d0678c679a6a5b", "score": "0.4550818", "text": "func (a *SubAccountApiService) ListSubAccountKeys(ctx context.Context, userId int32) ([]SubAccountKey, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue []SubAccountKey\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/sub_accounts/{user_id}/keys\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"user_id\"+\"}\", url.QueryEscape(parameterToString(userId, \"\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tif ctx == nil {\n\t\tctx = context.Background()\n\t}\n\tif ctx.Value(ContextGateAPIV4) == nil {\n\t\t// for compatibility, set configuration key and secret to context if ContextGateAPIV4 value is not present\n\t\tctx = context.WithValue(ctx, ContextGateAPIV4, GateAPIV4{\n\t\t\tKey: a.client.cfg.Key,\n\t\t\tSecret: a.client.cfg.Secret,\n\t\t})\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status + \", \" + string(localVarBody),\n\t\t}\n\t\tvar gateErr GateAPIError\n\t\tif e := a.client.decode(&gateErr, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\")); e == nil && gateErr.Label != \"\" {\n\t\t\tgateErr.APIError = newErr\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, gateErr\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "7337f0467c18053806459c1f30843499", "score": "0.4548866", "text": "func Flatten(toFlatten interface{}) (result interface{}) {\n\ttemp := toFlatten.(map[string]interface{})\n\tif len(temp) > 1 {\n\t\tpanic(\"ndgo.Flatten:: flattened json has more than 1 item, operation not supported\")\n\t}\n\tfor _, item := range temp {\n\t\treturn item\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e093fa1e5e4a132cacc8b60183df20fe", "score": "0.4546182", "text": "func (o *etcdOperator) Get(key string) map[string]string {\n\tctx, cancel := context.WithTimeout(context.Background(), time.Second)\n\tresp, err := o.client.Get(ctx, key)\n\tcancel()\n\n\t// handle error\n\tif err != nil {\n\t\to.logger.Fatal(err)\n\t}\n\n\tvalue := make(map[string]string)\n\t// print info\n\to.logger.Print(resp.Header.String())\n\to.logger.Printf(\"[Count: %v, HasMore: %v]\", resp.Count, resp.More)\n\tfor _, kv := range resp.Kvs {\n\t\to.logger.Print(kv.String())\n\t\tvalue[string(kv.Key)] = string(kv.Value)\n\t}\n\n\treturn value\n}", "title": "" }, { "docid": "c8469840ae54769a3e9af421cf4ddf8d", "score": "0.4543228", "text": "func getNestedExampleValue(r *Rule, version string) interface{} {\n\tif r.Rules == nil {\n\t\tswitch r.Type {\n\t\tcase Map:\n\t\t\treturn map[string]interface{}{}\n\t\tcase Slice:\n\t\t\treturn []interface{}{}\n\t\tdefault:\n\t\t\treturn nil\n\t\t}\n\t}\n\n\tptr := reflect.New(r.Rules.ResourceType())\n\tvalue := applyOutboundRules(ptr.Elem().Interface(), r.Rules, version)\n\tif r.Type == Slice {\n\t\tvalue = []interface{}{value}\n\t}\n\treturn value\n}", "title": "" }, { "docid": "fe62a1daa3c8fcab59b8c8a4771d909d", "score": "0.4539935", "text": "func (this *MultiMap) Get(key interface{}) interface{} {\n\tnode := this.tree.FindNode(key)\n\tif node != nil {\n\t\treturn node.Value()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "38988320a0ff67452d112ca38228e1c8", "score": "0.45308864", "text": "func GetNestedEntry(ctx context.Context, startingDir fs.Entry, pathElements []string) (fs.Entry, error) {\n\tcurrent := startingDir\n\n\tfor _, part := range pathElements {\n\t\tif part == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tdir, ok := current.(fs.Directory)\n\t\tif !ok {\n\t\t\treturn nil, errors.Errorf(\"entry not found %q: parent is not a directory\", part)\n\t\t}\n\n\t\te, err := dir.Child(ctx, part)\n\t\tif err != nil {\n\t\t\treturn nil, errors.Wrap(err, \"error reading directory\")\n\t\t}\n\n\t\tif e == nil {\n\t\t\treturn nil, errors.Errorf(\"entry not found: %q\", part)\n\t\t}\n\n\t\tcurrent = e\n\t}\n\n\treturn current, nil\n}", "title": "" }, { "docid": "a1c754ba244f6561e7192723eabc35cd", "score": "0.4527175", "text": "func (r *Subresource) GetWithRestart(key string) interface{} {\n\tif r.HasChange(key) {\n\t\tr.SetRestart(key)\n\t}\n\treturn r.Get(key)\n}", "title": "" }, { "docid": "fff5de6d1e3893199cb4678d9dc183ed", "score": "0.4525893", "text": "func Flatten_(nested map[string]interface{}, prefix string, style SeparatorStyle) (map[string]interface{}, error) {\n\tflatmap := make(map[string]interface{})\n\n\terr := flatten(true, flatmap, nested, prefix, style)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn flatmap, nil\n}", "title": "" }, { "docid": "26b280227df00a112f31268265c0e681", "score": "0.45239493", "text": "func (k Keeper) GetParams(ctx sdk.Context) (params types.Params) {\n\tk.paramSubspace.GetParamSet(ctx, &params)\n\treturn params\n}", "title": "" }, { "docid": "1a4ce672d32bc49483d97260d1c98e63", "score": "0.45211247", "text": "func (s *Structure) GetInnerPaths(fieldMask string) (paths []string) {\n\tinnerStructure := s\n\tfor _, segment := range strings.Split(fieldMask, \".\") {\n\t\tswitch o := (*innerStructure)[segment].(type) {\n\t\tcase *Structure:\n\t\t\tinnerStructure = o\n\t\tdefault:\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn innerStructure.getPaths(fieldMask)\n}", "title": "" }, { "docid": "2dda81cbc7ed5a180bf0e342860b6d4e", "score": "0.45194215", "text": "func GetKeys(document bson.D, _range ...bool) []string {\n\tfilter := document.Map()\n\tvar arr []string\n\tfor key, val := range filter {\n\t\tif key == \"$or\" || key == \"$and\" {\n\t\t\tfor _, elem := range val.(primitive.A) {\n\t\t\t\tfor k, v := range elem.(bson.D).Map() {\n\t\t\t\t\tif len(k) > 0 && k[0] != '$' {\n\t\t\t\t\t\tif len(_range) == 0 || _range[0] == isRange(v) {\n\t\t\t\t\t\t\tarr = append(arr, getKey(k, v)...)\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t} else if len(key) > 0 && key[0] != '$' {\n\t\t\tif len(_range) == 0 || _range[0] == isRange(val) {\n\t\t\t\tarr = append(arr, getKey(key, val)...)\n\t\t\t}\n\t\t}\n\t}\n\treturn arr\n}", "title": "" }, { "docid": "38fd311dda96d8c06a1e2bbbe6226e56", "score": "0.4513896", "text": "func GetAll(json []byte, keys []string, path ...string) ([]string, error) {\n\tvar err error\n\tvar val string\n\tresults := make([]string, 0, len(keys))\n\tfor _, k := range keys {\n\t\tval, err = GetString(json, append(path, k)...)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tresults = append(results, val)\n\t}\n\treturn results, nil\n}", "title": "" }, { "docid": "a83f797738edab1f0b46d09f76d98e48", "score": "0.4513606", "text": "func (s *Struct) nested(val reflect.Value) interface{} {\n\tvar finalVal interface{}\n\n\tv := reflect.ValueOf(val.Interface())\n\tif v.Kind() == reflect.Ptr {\n\t\tv = v.Elem()\n\t}\n\n\tswitch v.Kind() {\n\tcase reflect.Struct:\n\t\tn := New(val.Interface())\n\t\tn.TagName = s.TagName\n\t\tm := n.Map()\n\n\t\t// do not add the converted value if there are no exported fields, ie:\n\t\t// time.Time\n\t\tif len(m) == 0 {\n\t\t\tfinalVal = val.Interface()\n\t\t} else {\n\t\t\tfinalVal = m\n\t\t}\n\tcase reflect.Map:\n\t\t// get the element type of the map\n\t\tmapElem := val.Type()\n\t\tswitch val.Type().Kind() {\n\t\tcase reflect.Ptr, reflect.Array, reflect.Map,\n\t\t\treflect.Slice, reflect.Chan:\n\t\t\tmapElem = val.Type().Elem()\n\t\t\tif mapElem.Kind() == reflect.Ptr {\n\t\t\t\tmapElem = mapElem.Elem()\n\t\t\t}\n\t\t}\n\n\t\t// only iterate over struct types, ie: map[string]StructType,\n\t\t// map[string][]StructType,\n\t\tif mapElem.Kind() == reflect.Struct ||\n\t\t\t(mapElem.Kind() == reflect.Slice &&\n\t\t\t\tmapElem.Elem().Kind() == reflect.Struct) {\n\t\t\tm := make(map[string]interface{}, val.Len())\n\t\t\tfor _, k := range val.MapKeys() {\n\t\t\t\tm[k.String()] = s.nested(val.MapIndex(k))\n\t\t\t}\n\t\t\tfinalVal = m\n\t\t\tbreak\n\t\t}\n\n\t\t// TODO(arslan): should this be optional?\n\t\tfinalVal = val.Interface()\n\tcase reflect.Slice, reflect.Array:\n\t\tif val.Type().Kind() == reflect.Interface {\n\t\t\tfinalVal = val.Interface()\n\t\t\tbreak\n\t\t}\n\n\t\t// TODO(arslan): should this be optional?\n\t\t// do not iterate of non struct types, just pass the value. Ie: []int,\n\t\t// []string, co... We only iterate further if it's a struct.\n\t\t// i.e []foo or []*foo\n\t\tif val.Type().Elem().Kind() != reflect.Struct &&\n\t\t\t!(val.Type().Elem().Kind() == reflect.Ptr &&\n\t\t\t\tval.Type().Elem().Elem().Kind() == reflect.Struct) {\n\t\t\tfinalVal = val.Interface()\n\t\t\tbreak\n\t\t}\n\n\t\tslices := make([]interface{}, val.Len())\n\t\tfor x := 0; x < val.Len(); x++ {\n\t\t\tslices[x] = s.nested(val.Index(x))\n\t\t}\n\t\tfinalVal = slices\n\tdefault:\n\t\tfinalVal = val.Interface()\n\t}\n\n\treturn finalVal\n}", "title": "" }, { "docid": "a9e7a13014e43d8a0452ba966caa03a8", "score": "0.45122844", "text": "func (d *DAG) GetDescendants(id string) (map[string]interface{}, error) {\n\td.muDAG.RLock()\n\tdefer d.muDAG.RUnlock()\n\n\tif err := d.saneID(id); err != nil {\n\t\treturn nil, err\n\t}\n\tv := d.vertexIds[id]\n\t//return copyMap(d.getAncestors(v)), nil\n\n\tdescendants := make(map[string]interface{})\n\tfor dv := range d.getDescendants(v) {\n\t\tdid := d.vertices[dv]\n\t\tdescendants[did] = dv\n\t}\n\treturn descendants, nil\n}", "title": "" }, { "docid": "0364f8147488a8e6a92dd4f84c3d0377", "score": "0.4505322", "text": "func (c *Client) GetMulti(ctx context.Context, k []*Key) ([]Record, error) {\n\tpbks, err := keys(k).proto()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := pb.NewStoreClient(c.ClientConn).Get(c.newContext(ctx), &pb.Keys{\n\t\tKeys: pbks,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdocs, err := pbRecords(resp.Records).records()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn docs, multiErrorFromRecordStatusProto(resp.Status)\n}", "title": "" }, { "docid": "b73b58464af48f06fed4a4bfdb2e739b", "score": "0.45032948", "text": "func DeepGet(mp map[string]any, path string) (val any) {\n\tval, _ = GetByPath(path, mp)\n\treturn\n}", "title": "" }, { "docid": "491edc35e01f46f1ef6b37120bbaf3b4", "score": "0.45011583", "text": "func getNestedValue(input interface{}, node, separator string) (interface{}, error) {\n\tpp := strings.Split(node, separator)\n\tfor _, n := range pp {\n\t\tif isIndex(n) {\n\t\t\t// find slice/array\n\t\t\tif arr, ok := input.([]interface{}); ok {\n\t\t\t\tindx, err := getIndex(n)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn input, err\n\t\t\t\t}\n\t\t\t\tarrLen := len(arr)\n\t\t\t\tif arrLen == 0 ||\n\t\t\t\t\tindx > arrLen-1 {\n\t\t\t\t\treturn empty, errors.New(\"empty array\")\n\t\t\t\t}\n\t\t\t\tinput = arr[indx]\n\t\t\t}\n\t\t} else {\n\t\t\t// find in map\n\t\t\tvalidNode := false\n\t\t\tif mp, ok := input.(map[string]interface{}); ok {\n\t\t\t\tinput, ok = mp[n]\n\t\t\t\tvalidNode = ok\n\t\t\t}\n\n\t\t\t// find in group data\n\t\t\tif mp, ok := input.(map[string][]interface{}); ok {\n\t\t\t\tinput, ok = mp[n]\n\t\t\t\tvalidNode = ok\n\t\t\t}\n\n\t\t\tif !validNode {\n\t\t\t\treturn empty, fmt.Errorf(\"invalid node name %s\", n)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn input, nil\n}", "title": "" }, { "docid": "dbab9e1526762ff404195d1e73a957a0", "score": "0.44953743", "text": "func (db *DB) Get(key string) (string, error) {\n\tif db.parent != nil {\n\t\treturn db.parent.Get(path.Join(db.scope, key))\n\t}\n\treturn TreeGet(db.repo, db.tree, path.Join(db.scope, key))\n}", "title": "" }, { "docid": "643d6bf41395b1f6e76fcf1ba1f733c0", "score": "0.4492318", "text": "func (k Keeper) GetParams(ctx sdk.Context) types.Params {\n\tvar p types.Params\n\tk.paramSubspace.GetParamSet(ctx, &p)\n\treturn p\n}", "title": "" }, { "docid": "f7845179b15f425c97bcc05ea6c48770", "score": "0.4481264", "text": "func (s *Trie) get(root, key []byte, batch [][]byte, iBatch, height int) ([]byte, error) {\n\tif len(root) == 0 {\n\t\t// the trie does not contain the key\n\t\treturn nil, nil\n\t}\n\t// Fetch the children of the node\n\tbatch, iBatch, lnode, rnode, isShortcut, err := s.loadChildren(root, height, iBatch, batch)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif isShortcut {\n\t\tif bytes.Equal(lnode[:HashLength], key) {\n\t\t\treturn rnode[:HashLength], nil\n\t\t}\n\t\t// also returns nil if height 0 is not a shortcut\n\t\treturn nil, nil\n\t}\n\tif bitIsSet(key, s.TrieHeight-height) {\n\t\treturn s.get(rnode, key, batch, 2*iBatch+2, height-1)\n\t}\n\treturn s.get(lnode, key, batch, 2*iBatch+1, height-1)\n}", "title": "" }, { "docid": "f570c50b82c76f86da261c022bc81c1f", "score": "0.44801843", "text": "func flattenImageSourceDiskEncryptionKeyMap(c *Client, i interface{}) map[string]ImageSourceDiskEncryptionKey {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]ImageSourceDiskEncryptionKey{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]ImageSourceDiskEncryptionKey{}\n\t}\n\n\titems := make(map[string]ImageSourceDiskEncryptionKey)\n\tfor k, item := range a {\n\t\titems[k] = *flattenImageSourceDiskEncryptionKey(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "2ce7ee0cd6fa4e38f242bd97b4f84882", "score": "0.44798127", "text": "func flattenImageImageEncryptionKeyMap(c *Client, i interface{}) map[string]ImageImageEncryptionKey {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]ImageImageEncryptionKey{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]ImageImageEncryptionKey{}\n\t}\n\n\titems := make(map[string]ImageImageEncryptionKey)\n\tfor k, item := range a {\n\t\titems[k] = *flattenImageImageEncryptionKey(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "adc715660698821d65859cdb2f383e8a", "score": "0.4474911", "text": "func (t *Tree) Get(key string) interface{} {\n tree := t.find(key)\n if tree == nil {\n return nil\n }\n return tree.value\n}", "title": "" }, { "docid": "28e4bfa91a4ba3c01c9ce30979dc4d24", "score": "0.44738397", "text": "func GetTree() map[string]interface{} {\n\n\treturn tree\n\n}", "title": "" }, { "docid": "0baa6f486f6ab048fa56883a933ac219", "score": "0.44730663", "text": "func (db *Database) get(ctx context.Context, key string, value interface{}) error {\n\topt := &api.QueryOptions{}\n\topt = opt.WithContext(ctx)\n\n\tp := path.Join(db.prefix, key)\n\n\tkv, _, err := db.kv.Get(p, opt)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to fetch %s: %w\", p, err)\n\t}\n\tif kv == nil {\n\t\treturn fmt.Errorf(\"%s not found: %w\", p, database.ErrNotFound)\n\t}\n\n\tif err := json.Unmarshal(kv.Value, value); err != nil {\n\t\treturn fmt.Errorf(\"unable to unmarshal data: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f8d715b4129545b0254c8de48d3801ed", "score": "0.44648215", "text": "func (k *KV) Keys(prefix, separator string, q *QueryOptions) ([]string, *QueryMeta, error) {\n\tparams := map[string]string{\"keys\": \"\"}\n\tif separator != \"\" {\n\t\tparams[\"separator\"] = separator\n\t}\n\tresp, qm, err := k.getInternal(prefix, params, q)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tif resp == nil {\n\t\treturn nil, qm, nil\n\t}\n\tdefer closeResponseBody(resp)\n\n\tvar entries []string\n\tif err := decodeBody(resp, &entries); err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn entries, qm, nil\n}", "title": "" }, { "docid": "6900a85faa1098f53db6ecbe1e2460ce", "score": "0.44587874", "text": "func (s *Dao) Get(ctx context.Context, req *model.GetKVRequest) (*model.KVDoc, error) {\n\tresp, err := etcdadpt.Get(ctx, key.KV(req.Domain, req.Project, req.ID))\n\tif err != nil {\n\t\topenlog.Error(err.Error())\n\t\treturn nil, err\n\t}\n\tif resp == nil {\n\t\treturn nil, datasource.ErrKeyNotExists\n\t}\n\tcurKV := &model.KVDoc{}\n\terr = json.Unmarshal(resp.Value, curKV)\n\tif err != nil {\n\t\topenlog.Error(\"decode error: \" + err.Error())\n\t\treturn nil, err\n\t}\n\treturn curKV, nil\n}", "title": "" }, { "docid": "4615d861213bf47472002d21c0550557", "score": "0.4455357", "text": "func PathKeyFromStruct(v reflect.Value) (map[string]string, error) {\n\tgs, ok := v.Interface().(keyHelperGoKeyStruct)\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"cannot render to gNMI PathElem for structs that do not implement KeyHelperGoStruct, got: %T (%s)\", v.Type().Name(), v.Interface())\n\t}\n\n\tkm, err := gs.ΛListKeyMap()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tk, err := keyMapAsStrings(km)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn k, nil\n}", "title": "" }, { "docid": "7adef0089d0e39bcdd1219938148e0ce", "score": "0.4453066", "text": "func (s *EtcdStorage) List(ctx context.Context, prefix string) ([]string, error) {\n\tif !strings.HasSuffix(prefix, \"/\") {\n\t\tprefix += \"/\"\n\t}\n\n\tresp, err := s.c.Get(ctx, prefix, etcdclient.WithPrefix())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tkeys := map[string]struct{}{}\n\tfor _, kv := range resp.Kvs {\n\t\tkey := string(kv.Key)\n\n\t\tif strings.HasPrefix(key, prefix) {\n\t\t\tkey = strings.TrimPrefix(key, prefix)\n\t\t\tif len(key) == 0 {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\tif i := strings.Index(key, \"/\"); i == -1 {\n\t\t\t\tkeys[key] = struct{}{}\n\t\t\t} else {\n\t\t\t\tkeys[key[:i+1]] = struct{}{}\n\t\t\t}\n\t\t}\n\t}\n\n\tkeysList := make([]string, len(keys))\n\ti := 0\n\tfor key := range keys {\n\t\tkeysList[i] = key\n\t\ti++\n\t}\n\n\tsort.Strings(keysList)\n\n\treturn keysList, nil\n}", "title": "" }, { "docid": "166319b9e5cb6c612f682e2810569b36", "score": "0.44477433", "text": "func (k *KV) List(prefix string, q *QueryOptions) (KVPairs, *QueryMeta, error) {\n\tresp, qm, err := k.getInternal(prefix, map[string]string{\"recurse\": \"\"}, q)\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\tif resp == nil {\n\t\treturn nil, qm, nil\n\t}\n\tdefer closeResponseBody(resp)\n\n\tvar entries []*KVPair\n\tif err := decodeBody(resp, &entries); err != nil {\n\t\treturn nil, nil, err\n\t}\n\treturn entries, qm, nil\n}", "title": "" }, { "docid": "6925b622779cc3b079d703b4f84d1fab", "score": "0.4447349", "text": "func (e *Variables) buildPaths(keyMap map[string]interface{}) []string {\n\tvar paths []string\n\n\tfor key, item := range keyMap {\n\t\tif reflect.TypeOf(item).Kind() != reflect.Map {\n\t\t\tpaths = append(paths, key)\n\t\t\tcontinue\n\t\t}\n\n\t\tsubMap := item.(map[string]interface{})\n\n\t\tsubPaths := e.buildPaths(subMap)\n\t\tfor _, path := range subPaths {\n\t\t\tpaths = append(paths, fmt.Sprintf(\"%s.%s\", key, path))\n\t\t}\n\t}\n\n\treturn paths\n}", "title": "" }, { "docid": "03d972682a287e4cfac98f18b522419b", "score": "0.44310728", "text": "func walkJson(v interface{}, key string) string {\n\tvar res, subRes string\n\n\t// Camel case the key\n\tif key != \"\" {\n\t\tres = CamelCase(key)\n\t}\n\n\t// Reflect value and type\n\trv := reflect.ValueOf(v)\n\trt := reflect.TypeOf(v)\n\n\tswitch getKind(rt) {\n\tcase reflect.Slice:\n\t\t// Find out element type\n\t\tswitch getKind(rt.Elem()) {\n\t\t// If the element is map, continue into the map\n\t\tcase reflect.Map:\n\t\t\tsubRes = walkJson(rv.Index(0).Interface(), key)\n\t\t// If the element is null or other interface\n\t\tcase reflect.Interface:\n\t\t\tsubRes = \"interface{}\"\n\t\t\t// If it's not an empty, continue into the element\n\t\t\tif rt != nil && rv.Len() > 0 {\n\t\t\t\tsubRes = walkJson(rv.Index(0).Interface(), \"\")\n\t\t\t}\n\t\t// All other types, simply get the type string\n\t\tdefault:\n\t\t\tsubRes = rt.Elem().Kind().String()\n\t\t}\n\t\tres = fmt.Sprintf(\"%s []%s\", res, subRes)\n\tcase reflect.Map:\n\t\t// Loop through the map continue into each leaf\n\t\tfor _, kv := range rv.MapKeys() {\n\t\t\tsubRes += walkJson(rv.MapIndex(kv).Interface(), kv.Interface().(string))\n\t\t}\n\t\tres = fmt.Sprintf(\"%s struct {%s}\", res, subRes)\n\tdefault:\n\t\tvar typ string\n\t\t// If value is null use interface type\n\t\tif rt == nil {\n\t\t\ttyp = \"interface{}\"\n\t\t} else {\n\t\t\ttyp = getKind(rt).String()\n\t\t}\n\t\tres = fmt.Sprintf(\"%s %s\", res, typ)\n\t}\n\n\t// Add field tags\n\tif key != \"\" {\n\t\tres = fmt.Sprintf(\"%s `json:\\\"%s\\\"`\\n\", res, key)\n\t}\n\treturn res\n}", "title": "" }, { "docid": "cb16ecd0c37be174ff6e902d8cbd42be", "score": "0.4427742", "text": "func AllKeys() Subspace {\n\treturn subspace{}\n}", "title": "" }, { "docid": "df7443dc80bd554250e67aafd96f171b", "score": "0.4421446", "text": "func getUser(ctx sdk.Context, path []string, k Keeper) (res []byte, sdkError error) {\n\tkey := path[0]\n\tuser, err := k.GetUser(ctx, key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tres, err = codec.MarshalJSONIndent(k.cdc, user)\n\tif err != nil {\n\t\treturn nil, sdkerrors.Wrap(sdkerrors.ErrJSONMarshal, err.Error())\n\t}\n\n\treturn res, nil\n}", "title": "" }, { "docid": "daa22d82bfa40ab1065bd90e168812c1", "score": "0.4420844", "text": "func (c *client) GetEntries(key string) ([]string, error) {\n\tresp, err := c.keysAPI.Get(c.ctx, key, &etcd.GetOptions{Recursive: true})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Special case. Note that it's possible that len(resp.Node.Nodes) == 0 and\n\t// resp.Node.Value is also empty, in which case the key is empty and we\n\t// should not return any entries.\n\tif len(resp.Node.Nodes) == 0 && resp.Node.Value != \"\" {\n\t\treturn []string{resp.Node.Value}, nil\n\t}\n\n\tentries := make([]string, len(resp.Node.Nodes))\n\tfor i, node := range resp.Node.Nodes {\n\t\tentries[i] = node.Value\n\t}\n\treturn entries, nil\n}", "title": "" }, { "docid": "1b64d65ce4044fddc1104c79178c65a5", "score": "0.441894", "text": "func (d *dataUsageCache) flatten(root dataUsageEntry) dataUsageEntry {\n\tfor id := range root.Children {\n\t\te := d.Cache[id]\n\t\tif len(e.Children) > 0 {\n\t\t\te = d.flatten(e)\n\t\t}\n\t\troot.merge(e)\n\t}\n\troot.Children = nil\n\treturn root\n}", "title": "" }, { "docid": "0241f6f3381083531d77125e6a5f1413", "score": "0.4418181", "text": "func flattenImageSourceSnapshotEncryptionKeyMap(c *Client, i interface{}) map[string]ImageSourceSnapshotEncryptionKey {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]ImageSourceSnapshotEncryptionKey{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]ImageSourceSnapshotEncryptionKey{}\n\t}\n\n\titems := make(map[string]ImageSourceSnapshotEncryptionKey)\n\tfor k, item := range a {\n\t\titems[k] = *flattenImageSourceSnapshotEncryptionKey(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "dd56e715a3a3844344cd4af112f6a82a", "score": "0.44170782", "text": "func (o *Object) GetAll(key string) []string {\n\tresults := make([]string, 0)\n\tfor _, pair := range o.Pairs {\n\t\tif pair.Key == key {\n\t\t\tresults = append(results, pair.Value)\n\t\t}\n\t}\n\treturn results\n}", "title": "" }, { "docid": "10017acdd2fa23fe7fb6e673e0dacf54", "score": "0.44145265", "text": "func GetNestedOrderedMap(t *testing.T) *OrderedList_OrderedMap {\n\tom := GetOrderedMap(t)\n\n\tnestedOrderedMap := &OrderedList_OrderedList_OrderedMap{}\n\tv, err := nestedOrderedMap.AppendNew(\"foo\")\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\tv.Value = ygot.String(\"foo-val\")\n\tv, err = nestedOrderedMap.AppendNew(\"bar\")\n\tif err != nil {\n\t\tt.Error(err)\n\t}\n\tv.Value = ygot.String(\"bar-val\")\n\n\tom.Get(\"foo\").OrderedList = nestedOrderedMap\n\treturn om\n}", "title": "" }, { "docid": "b208b5fafc54a32c802a8e3f4847c6b0", "score": "0.44115317", "text": "func lookupKeysStack(key []string, contexts []reflect.Value) reflect.Value {\n\tvar v reflect.Value\n\n\tif len(key) == 0 {\n\t\treturn v\n\t}\n\n\tfor i := range key {\n\t\tif i == 0 {\n\t\t\tv = lookupKeyStack(key[i], contexts)\n\t\t\tcontinue\n\t\t}\n\t\tv = lookupKeyContext(key[i], v)\n\t\tif !v.IsValid() {\n\t\t\tbreak\n\t\t}\n\t}\n\treturn v\n}", "title": "" }, { "docid": "cdd975c64305c35f9a5b25032bb42199", "score": "0.44098637", "text": "func (d *Dtrie) Get(key interface{}) interface{} {\n\treturn get(d.root, d.hasher(key), key).Value()\n}", "title": "" }, { "docid": "8eea5d4ddf3de45f7b343e970f8c1bb9", "score": "0.43902975", "text": "func GetNestedMap(obj *unstructured.Unstructured, fields ...string) (map[string]interface{}, error) {\n\tnestedMap, found, err := unstructured.NestedMap(obj.Object, fields...)\n\tif err != nil || !found {\n\t\treturn nil, err\n\t}\n\treturn nestedMap, nil\n}", "title": "" }, { "docid": "9e1c78e5718468f5e8627f1bef6f3d95", "score": "0.43882218", "text": "func (j Json) GetMany(path ...string) []gjson.Result {\n\treturn gjson.GetMany(string(j), path...)\n}", "title": "" }, { "docid": "382405dac662b71a0ebd6cdd9e363bcd", "score": "0.43874213", "text": "func (t *StringTrie) Get(key string) interface{} {\n\tnode := t\n\tfor part, i := t.segmenter(key, 0); part != \"\"; part, i = t.segmenter(key, i) {\n\t\tnode = node.children[part]\n\t\tif node == nil {\n\t\t\treturn nil\n\t\t}\n\t}\n\treturn node.value\n}", "title": "" }, { "docid": "34ca178b18dd1ee31c42caf02bcced2b", "score": "0.43767884", "text": "func Flatten(nested interface{}) []interface{} {\n\tflattened := []interface{}{}\n\tnestedSlice, ok := nested.([]interface{})\n\tif !ok {\n\t\treturn flattened\n\t}\n\tfor _, e := range nestedSlice {\n\t\tt := reflect.TypeOf(e)\n\t\tif t == nil {\n\t\t\tcontinue\n\t\t}\n\t\tswitch kind := t.Kind(); kind {\n\t\tcase reflect.Slice:\n\t\t\tflattened = append(flattened, Flatten(e)...)\n\t\tdefault:\n\t\t\tflattened = append(flattened, e)\n\t\t}\n\t}\n\treturn flattened\n}", "title": "" }, { "docid": "b3c9824e4cdd3dd7f9eaaf6efcfe2ab5", "score": "0.43726525", "text": "func ( handle * MemcacheClient) GetAllKey( ) ([]string ,error){\n\treturn nil,nil\n}", "title": "" }, { "docid": "a1a1396b11b3c2e2d265c3aece3130f3", "score": "0.43599582", "text": "func (descriptor *EntityDescriptor) GetKeyValues(entity interface{}) []interface{} {\n\tif entity == nil {\n\t\tpanic(\"not able to get key value for nil entity\")\n\t}\n\n\tif (descriptor.key == nil || descriptor.key.field == nil) && len(descriptor.multiKeys) == 0 {\n\t\treturn nil\n\t}\n\n\tvalue := reflect.ValueOf(entity)\n\tif value.Kind() == reflect.Ptr {\n\t\tvalue = value.Elem()\n\t}\n\n\tif descriptor.key != nil {\n\t\tkeyValue := value.FieldByIndex(descriptor.key.field.field.Index).Interface()\n\t\treturn []interface{}{keyValue}\n\t}\n\n\tkeyValues := make([]interface{}, 0, len(descriptor.multiKeys))\n\tfor _, k := range descriptor.multiKeys {\n\t\tkeyValues = append(keyValues, value.FieldByIndex(k.field.Index).Interface())\n\t}\n\n\treturn keyValues\n}", "title": "" }, { "docid": "221aa533da567dd8a64951636b8d6b9c", "score": "0.43540987", "text": "func (m *EtcdManager) GetItemList(key string) []map[string]string {\n\tresp := m.GetRespWithPrefix(key)\n\n\titemList := make([]map[string]string, 0)\n\tfor _, ev := range resp.Kvs {\n\t\titem := make(map[string]string)\n\t\titem[string(ev.Key)] = string(ev.Value)\n\t\titemList = append(itemList, item)\n\t}\n\n\treturn itemList\n}", "title": "" }, { "docid": "85e59c66796db169f345cdca32733bd3", "score": "0.43512133", "text": "func (p TreeWriter) getFields(leaf *yaml.RNode) (treeFields, error) {\n\tfieldsByName := map[string]*treeField{}\n\n\t// index nested and non-nested fields\n\tfor i := range p.Fields {\n\t\tf := p.Fields[i]\n\t\tseq, err := leaf.Pipe(&f)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif seq == nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tif fieldsByName[f.Name] == nil {\n\t\t\tfieldsByName[f.Name] = &treeField{name: f.Name}\n\t\t}\n\n\t\t// non-nested field -- add directly to the treeFields list\n\t\tif f.SubName == \"\" {\n\t\t\t// non-nested field -- only 1 element\n\t\t\tval, err := yaml.String(seq.Content()[0], yaml.Trim, yaml.Flow)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\t\t\tfieldsByName[f.Name].value = val\n\t\t\tcontinue\n\t\t}\n\n\t\t// nested-field -- create a parent elem, and index by the 'match' value\n\t\tif fieldsByName[f.Name].subFieldByMatch == nil {\n\t\t\tfieldsByName[f.Name].subFieldByMatch = map[string]treeFields{}\n\t\t}\n\t\tindex := fieldsByName[f.Name].subFieldByMatch\n\t\tfor j := range seq.Content() {\n\t\t\telem := seq.Content()[j]\n\t\t\tmatches := f.Matches[elem]\n\t\t\tstr, err := yaml.String(elem, yaml.Trim, yaml.Flow)\n\t\t\tif err != nil {\n\t\t\t\treturn nil, err\n\t\t\t}\n\n\t\t\t// map the field by the name of the element\n\t\t\t// index the subfields by the matching element so we can put all the fields for the\n\t\t\t// same element under the same branch\n\t\t\tmatchKey := strings.Join(matches, \"/\")\n\t\t\tindex[matchKey] = append(index[matchKey], &treeField{name: f.SubName, value: str})\n\t\t}\n\t}\n\n\t// iterate over collection of all queried fields in the Resource\n\tfor _, field := range fieldsByName {\n\t\t// iterate over collection of elements under the field -- indexed by element name\n\t\tfor match, subFields := range field.subFieldByMatch {\n\t\t\t// create a new element for this collection of fields\n\t\t\t// note: we will convert name to an index later, but keep the match for sorting\n\t\t\telem := &treeField{name: match}\n\t\t\tfield.matchingElementsAndFields = append(field.matchingElementsAndFields, elem)\n\n\t\t\t// iterate over collection of queried fields for the element\n\t\t\tfor i := range subFields {\n\t\t\t\t// add to the list of fields for this element\n\t\t\t\telem.matchingElementsAndFields = append(elem.matchingElementsAndFields, subFields[i])\n\t\t\t}\n\t\t}\n\t\t// clear this cached data\n\t\tfield.subFieldByMatch = nil\n\t}\n\n\t// put the fields in a list so they are ordered\n\tfieldList := treeFields{}\n\tfor _, v := range fieldsByName {\n\t\tfieldList = append(fieldList, v)\n\t}\n\n\t// sort the fields\n\tsort.Sort(fieldList)\n\tfor i := range fieldList {\n\t\tfield := fieldList[i]\n\t\t// sort the elements under this field\n\t\tsort.Sort(field.matchingElementsAndFields)\n\n\t\tfor i := range field.matchingElementsAndFields {\n\t\t\telement := field.matchingElementsAndFields[i]\n\t\t\t// sort the elements under a list field by their name\n\t\t\tsort.Sort(element.matchingElementsAndFields)\n\t\t\t// set the name of the element to its index\n\t\t\telement.name = fmt.Sprintf(\"%d\", i)\n\t\t}\n\t}\n\n\treturn fieldList, nil\n}", "title": "" }, { "docid": "acc931c466e5fbb033f58b400cf05d4f", "score": "0.4345138", "text": "func (r *Subresource) Get(key string) interface{} {\n\treturn r.data[key]\n}", "title": "" }, { "docid": "d46ab6eab038007323620d8ab49fc3b5", "score": "0.43445253", "text": "func (t Tags) GetAll(key string) []string {\n\tswitch vs := t[key].(type) {\n\tcase string:\n\t\treturn []string{vs}\n\tcase []string:\n\t\treturn vs\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "a47918a04cbf067d172d45252599fea0", "score": "0.43413118", "text": "func expandProjectParentMap(c *Client, f map[string]ProjectParent) (map[string]interface{}, error) {\n\tif f == nil {\n\t\treturn nil, nil\n\t}\n\n\titems := make(map[string]interface{})\n\tfor k, item := range f {\n\t\ti, err := expandProjectParent(c, &item)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tif i != nil {\n\t\t\titems[k] = i\n\t\t}\n\t}\n\n\treturn items, nil\n}", "title": "" }, { "docid": "322177464639f7b92aefb8d2e75095f8", "score": "0.43387637", "text": "func expandKey(c *Client, f *Key) (map[string]interface{}, error) {\n\tm := make(map[string]interface{})\n\tres := f\n\t_ = res\n\tif v, err := dcl.DeriveField(\"projects/%s/keys/%s\", f.Name, dcl.SelfLinkToName(f.Project), dcl.SelfLinkToName(f.Name)); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Name into name: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"name\"] = v\n\t}\n\tif v := f.DisplayName; dcl.ValueShouldBeSent(v) {\n\t\tm[\"displayName\"] = v\n\t}\n\tif v, err := expandKeyWebSettings(c, f.WebSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding WebSettings into webSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"webSettings\"] = v\n\t}\n\tif v, err := expandKeyAndroidSettings(c, f.AndroidSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding AndroidSettings into androidSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"androidSettings\"] = v\n\t}\n\tif v, err := expandKeyIosSettings(c, f.IosSettings, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding IosSettings into iosSettings: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"iosSettings\"] = v\n\t}\n\tif v := f.Labels; dcl.ValueShouldBeSent(v) {\n\t\tm[\"labels\"] = v\n\t}\n\tif v, err := expandKeyTestingOptions(c, f.TestingOptions, res); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding TestingOptions into testingOptions: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"testingOptions\"] = v\n\t}\n\tif v, err := dcl.EmptyValue(); err != nil {\n\t\treturn nil, fmt.Errorf(\"error expanding Project into project: %w\", err)\n\t} else if !dcl.IsEmptyValueIndirect(v) {\n\t\tm[\"project\"] = v\n\t}\n\n\treturn m, nil\n}", "title": "" }, { "docid": "06d833249d0177e0d47512c302d02d76", "score": "0.43358305", "text": "func (c *Client) Get(ctx context.Context, k *Key) (Record, error) {\n\tresp, err := c.GetMulti(ctx, []*Key{k})\n\tif err != nil {\n\t\tif me, ok := err.(MultiError); ok {\n\t\t\treturn nil, me[0]\n\t\t}\n\t\treturn nil, err\n\t}\n\treturn resp[0], nil\n}", "title": "" }, { "docid": "2e760908735993a47967f4a2619de839", "score": "0.43352968", "text": "func (e *Etcd) GetWithKeyPrefix(keyPrefix string) (keys [][]byte, values [][]byte, err error) {\n\n\tgetResponse, err := e.kv.Get(context.Background(), keyPrefix, clientv3.WithPrefix())\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tkeys = make([][]byte, 0)\n\tvalues = make([][]byte, 0)\n\n\tif len(getResponse.Kvs) == 0 {\n\t\treturn\n\t}\n\n\tfor _, kv := range getResponse.Kvs {\n\n\t\tkeys = append(keys, kv.Key)\n\t\tvalues = append(values, kv.Value)\n\t}\n\treturn\n\n}", "title": "" }, { "docid": "de852d361273c82a2d0204dae83766fe", "score": "0.43334424", "text": "func (opts Options) GetAll(key string) []string {\n\tresult := []string{}\n\tfor _, o := range opts {\n\t\tif o.IsKey(key) {\n\t\t\tresult = append(result, o.Value)\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "a8eebd1e9d16ae1983cf48e03857d033", "score": "0.43181807", "text": "func flattenProjectParentMap(c *Client, i interface{}) map[string]ProjectParent {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]ProjectParent{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]ProjectParent{}\n\t}\n\n\titems := make(map[string]ProjectParent)\n\tfor k, item := range a {\n\t\titems[k] = *flattenProjectParent(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "52e3dc2089c25415ae200a681cfdd1bc", "score": "0.43148577", "text": "func (c *clusterCache) IterateHierarchy(key kube.ResourceKey, action func(resource *Resource, namespaceResources map[kube.ResourceKey]*Resource) bool) {\n\tc.lock.RLock()\n\tdefer c.lock.RUnlock()\n\tif res, ok := c.resources[key]; ok {\n\t\tnsNodes := c.nsIndex[key.Namespace]\n\t\tif !action(res, nsNodes) {\n\t\t\treturn\n\t\t}\n\t\tchildrenByUID := make(map[types.UID][]*Resource)\n\t\tfor _, child := range nsNodes {\n\t\t\tif res.isParentOf(child) {\n\t\t\t\tchildrenByUID[child.Ref.UID] = append(childrenByUID[child.Ref.UID], child)\n\t\t\t}\n\t\t}\n\t\t// make sure children has no duplicates\n\t\tfor _, children := range childrenByUID {\n\t\t\tif len(children) > 0 {\n\t\t\t\t// The object might have multiple children with the same UID (e.g. replicaset from apps and extensions group). It is ok to pick any object but we need to make sure\n\t\t\t\t// we pick the same child after every refresh.\n\t\t\t\tsort.Slice(children, func(i, j int) bool {\n\t\t\t\t\tkey1 := children[i].ResourceKey()\n\t\t\t\t\tkey2 := children[j].ResourceKey()\n\t\t\t\t\treturn strings.Compare(key1.String(), key2.String()) < 0\n\t\t\t\t})\n\t\t\t\tchild := children[0]\n\t\t\t\tif action(child, nsNodes) {\n\t\t\t\t\tchild.iterateChildren(nsNodes, map[kube.ResourceKey]bool{res.ResourceKey(): true}, func(err error, child *Resource, namespaceResources map[kube.ResourceKey]*Resource) bool {\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\tc.log.V(2).Info(err.Error())\n\t\t\t\t\t\t\treturn false\n\t\t\t\t\t\t}\n\t\t\t\t\t\treturn action(child, namespaceResources)\n\t\t\t\t\t})\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "9bd223d383ef8519be0ec4983124bc6c", "score": "0.4307553", "text": "func (m AggregationRecord) GetKeys() map[string]string {\n\treturn m.Keys\n}", "title": "" }, { "docid": "d002c9c164de8046a9c786043a6c5638", "score": "0.43065295", "text": "func (cs ConsulStorage) List(ctx context.Context, prefix string, recursive bool) ([]string, error) {\n\tvar keysFound []string\n\n\t// get a list of all keys at prefix\n\tkeys, _, err := cs.ConsulClient.KV().Keys(cs.prefixKey(prefix), \"\", ConsulQueryDefaults(ctx))\n\tif err != nil {\n\t\treturn keysFound, err\n\t}\n\n\tif len(keys) == 0 {\n\t\treturn keysFound, fs.ErrNotExist\n\t}\n\n\t// remove default prefix from keys\n\tfor _, key := range keys {\n\t\tif strings.HasPrefix(key, cs.prefixKey(prefix)) {\n\t\t\tkey = strings.TrimPrefix(key, cs.Prefix+\"/\")\n\t\t\tkeysFound = append(keysFound, key)\n\t\t}\n\t}\n\n\t// if recursive wanted, just return all keys\n\tif recursive {\n\t\treturn keysFound, nil\n\t}\n\n\t// for non-recursive split path and look for unique keys just under given prefix\n\tkeysMap := make(map[string]bool)\n\tfor _, key := range keysFound {\n\t\tdir := strings.Split(strings.TrimPrefix(key, prefix+\"/\"), \"/\")\n\t\tkeysMap[dir[0]] = true\n\t}\n\n\tkeysFound = make([]string, 0)\n\tfor key := range keysMap {\n\t\tkeysFound = append(keysFound, path.Join(prefix, key))\n\t}\n\n\treturn keysFound, nil\n}", "title": "" }, { "docid": "43604f2324220538352732a8cf9b81bf", "score": "0.43051866", "text": "func GetSubPkgs(importPath, tag string, dirs []string) []*hv.PkgInfo {\n\tq := connDb()\n\tdefer q.Close()\n\n\tpinfos := make([]*hv.PkgInfo, 0, len(dirs))\n\tfor _, v := range dirs {\n\t\tv = importPath + \"/\" + v\n\t\tif pinfo, err := getPkgInfoWithQ(v, tag, q); err == nil {\n\t\t\tpinfos = append(pinfos, pinfo)\n\t\t} else {\n\t\t\tpinfos = append(pinfos, &hv.PkgInfo{ImportPath: v})\n\t\t}\n\t}\n\treturn pinfos\n}", "title": "" }, { "docid": "a4c268cd1eeb9fc7ac368c8f957c3ed0", "score": "0.42883688", "text": "func multiGetTags(ctx context.Context, keys []*datastore.Key, cb func(*datastore.Key, *model.Tag) error) error {\n\ttags := make([]model.Tag, len(keys))\n\tfor i, k := range keys {\n\t\ttags[i] = model.Tag{\n\t\t\tID: k.StringID(),\n\t\t\tInstance: k.Parent(),\n\t\t}\n\t}\n\n\terrAt := func(idx int) error { return nil }\n\tif err := datastore.Get(ctx, tags); err != nil {\n\t\tmerr, ok := err.(errors.MultiError)\n\t\tif !ok {\n\t\t\treturn errors.Annotate(err, \"GetMulti RPC error when fetching %d tags\", len(tags)).Tag(transient.Tag).Err()\n\t\t}\n\t\terrAt = func(idx int) error { return merr[idx] }\n\t}\n\n\tfor i, t := range tags {\n\t\tswitch err := errAt(i); {\n\t\tcase err == datastore.ErrNoSuchEntity:\n\t\t\tcontinue\n\t\tcase err != nil:\n\t\t\treturn errors.Annotate(err, \"failed to fetch tag entity with key %s\", keys[i]).Err()\n\t\t}\n\t\tif err := cb(keys[i], &t); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8557725ee6cf222c4bc17d6aefee75a7", "score": "0.4287599", "text": "func flattenImageSourceImageEncryptionKeyMap(c *Client, i interface{}) map[string]ImageSourceImageEncryptionKey {\n\ta, ok := i.(map[string]interface{})\n\tif !ok {\n\t\treturn map[string]ImageSourceImageEncryptionKey{}\n\t}\n\n\tif len(a) == 0 {\n\t\treturn map[string]ImageSourceImageEncryptionKey{}\n\t}\n\n\titems := make(map[string]ImageSourceImageEncryptionKey)\n\tfor k, item := range a {\n\t\titems[k] = *flattenImageSourceImageEncryptionKey(c, item.(map[string]interface{}))\n\t}\n\n\treturn items\n}", "title": "" }, { "docid": "396ad684626e72c747b2e73060b058a5", "score": "0.4286677", "text": "func (o *IamLdapBasePropertiesAllOf) GetNestedGroupSearchDepth() int64 {\n\tif o == nil || o.NestedGroupSearchDepth == nil {\n\t\tvar ret int64\n\t\treturn ret\n\t}\n\treturn *o.NestedGroupSearchDepth\n}", "title": "" }, { "docid": "da3b278d23f8b54b52e8432629d66d44", "score": "0.42850482", "text": "func keysToGetManyRequest(keys []dskey.Key, position int) ([]byte, error) {\n\trequest := struct {\n\t\tRequests []dskey.Key `json:\"requests\"`\n\t\tPosition int `json:\"position,omitempty\"`\n\t}{keys, position}\n\treturn json.Marshal(request)\n}", "title": "" } ]
d3635471b0a0e2bc8e18b4335f0f344a
/ DeleteApiKey Delete API Key Delete an API key for any user in your organization.
[ { "docid": "1000029d66088df7afc6c9d2eace551c", "score": "0.80864424", "text": "func (a *APIKeysApiService) DeleteApiKey(ctx context.Context, name string, user string) ApiDeleteApiKeyRequest {\n\treturn ApiDeleteApiKeyRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tname: name,\n\t\tuser: user,\n\t}\n}", "title": "" } ]
[ { "docid": "633d106b16d42c23d843186ce60cee6e", "score": "0.765434", "text": "func (client *RestClient) DeleteAPIKey(name string) error {\n\tapikey := &corev2.APIKey{\n\t\tObjectMeta: corev2.ObjectMeta{\n\t\t\tName: name,\n\t\t},\n\t}\n\treturn client.Delete(apikey.URIPath())\n}", "title": "" }, { "docid": "4a45ecb832427abd61e3df8b1a01c978", "score": "0.7354805", "text": "func (s *API) DeleteAPIKey(req *DeleteAPIKeyRequest, opts ...scw.RequestOption) error {\n\tvar err error\n\n\tif fmt.Sprint(req.AccessKey) == \"\" {\n\t\treturn errors.New(\"field AccessKey cannot be empty in request\")\n\t}\n\n\tscwReq := &scw.ScalewayRequest{\n\t\tMethod: \"DELETE\",\n\t\tPath: \"/iam/v1alpha1/api-keys/\" + fmt.Sprint(req.AccessKey) + \"\",\n\t\tHeaders: http.Header{},\n\t}\n\n\terr = s.client.Do(scwReq, nil, opts...)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "49b980a55175edd2ebed3fa4a0c6b735", "score": "0.7348574", "text": "func (as *ApiService) DeleteSubApiKey(subName, passphrase, apiKey string) (*ApiResponse, error) {\n\tp := map[string]string{\n\t\t\"passphrase\": passphrase,\n\t\t\"subName\": subName,\n\t\t\"apiKey\": apiKey,\n\t}\n\treq := NewRequest(http.MethodDelete, \"/api/v1/sub/api-key\", p)\n\treturn as.Call(req)\n}", "title": "" }, { "docid": "08e8590f46a91ba1ad2fba8a5e07eaf3", "score": "0.7340008", "text": "func (a *Client) DeleteAPIKey(params *DeleteAPIKeyParams, authInfo runtime.ClientAuthInfoWriter) (*DeleteAPIKeyOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewDeleteAPIKeyParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"deleteApiKey\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/api/v1/apikeys/{key}\",\n\t\tProducesMediaTypes: []string{\"application/json\", \"application/xml\"},\n\t\tConsumesMediaTypes: []string{\"application/json\", \"application/xml\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &DeleteAPIKeyReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*DeleteAPIKeyOK), nil\n\n}", "title": "" }, { "docid": "2fa17d04c1df098b0c6e58c383cc0c4f", "score": "0.70834005", "text": "func (s *AgentsServiceOp) DeleteAgentAPIKey(ctx context.Context, projectID, agentAPIKey string) (*Response, error) {\n\tif projectID == \"\" {\n\t\treturn nil, atlas.NewArgError(\"projectID\", \"must be set\")\n\t}\n\tif agentAPIKey == \"\" {\n\t\treturn nil, atlas.NewArgError(\"agentAPIKey\", \"must be set\")\n\t}\n\tbasePath := fmt.Sprintf(agentAPIKeysBasePath, projectID)\n\tpath := fmt.Sprintf(\"%s/%s\", basePath, agentAPIKey)\n\treq, err := s.Client.NewRequest(ctx, http.MethodDelete, path, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp, err := s.Client.Do(ctx, req, nil)\n\tif err != nil {\n\t\treturn resp, err\n\t}\n\n\treturn resp, err\n}", "title": "" }, { "docid": "760274d3afa717f30752ff38ae3aa02b", "score": "0.7045995", "text": "func (c *Client) DeleteAPIKey(id string) (bool, RequestError) {\n\tif id == \"\" {\n\t\treturn false, RequestError{\n\t\t\tStatusCode: http.StatusInternalServerError,\n\t\t\tErr: ErrAPIKeyIDRequired,\n\t\t}\n\t}\n\n\tresponseBody, statusCode, err := c.Get(\"DELETE\", \"/api_keys/\"+id)\n\tif err != nil {\n\t\treturn false, RequestError{\n\t\t\tStatusCode: http.StatusInternalServerError,\n\t\t\tErr: err,\n\t\t}\n\t}\n\n\tif statusCode >= http.StatusMultipleChoices && statusCode != http.StatusNotFound { // ignore not found\n\t\treturn false, RequestError{\n\t\t\tStatusCode: statusCode,\n\t\t\tErr: fmt.Errorf(\"%w, status: %d, response: %s\", ErrFailedDeletingAPIKey, statusCode, responseBody),\n\t\t}\n\t}\n\n\treturn true, RequestError{StatusCode: http.StatusOK, Err: nil}\n}", "title": "" }, { "docid": "f6660e18c076cd80d8ea54ad9286dd79", "score": "0.7028964", "text": "func (a *APIKeysApiService) DeleteApiKeyExecute(r ApiDeleteApiKeyRequest) (*DeleteApiKeyResponse, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodDelete\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *DeleteApiKeyResponse\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"APIKeysApiService.DeleteApiKey\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/orgs/self/users/{user}/apikeys/{name}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"name\"+\"}\", url.PathEscape(parameterValueToString(r.name, \"name\")), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"user\"+\"}\", url.PathEscape(parameterValueToString(r.user, \"user\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := io.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = io.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 405 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 406 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 408 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 409 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 415 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 429 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 501 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 502 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 503 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "f7161c4871cce421384b780c0d07e1f2", "score": "0.6910187", "text": "func (c *BackendAPIClient) DeleteAPIKeyForSubUser(keyID, keyName string) error {\n\tif keyID == \"\" {\n\t\treturn errors.New(\"keyID must be a non-empty string\")\n\t}\n\tdeleteReq := c.restClient.BuildRequest(fmt.Sprintf(\"%s/%s\", APIRouteAPIKeys, keyID), rest.Delete)\n\tdeleteReq.Headers[HeaderOnBehalfOf] = keyName\n\tdeleteResp, err := c.restClient.InvokeRequest(deleteReq)\n\tif err != nil {\n\t\treturn errors.Wrapf(err, \"failed to delete key %s\", keyID)\n\t}\n\tif deleteResp.StatusCode != 204 {\n\t\treturn errors.New(fmt.Sprintf(\"non-204 status code returned, code=%d body=%s\", deleteResp.StatusCode, deleteResp.Body))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "9cd34f42a2c1a14c9e4e187205686dd6", "score": "0.68603563", "text": "func (service *APIKeyService) Delete(spaceID string, apiKey *APIKey) error {\n\tpath := fmt.Sprintf(\"/spaces/%s%s/api_keys/%s\", spaceID, getEnvPath(service.c), apiKey.Sys.ID)\n\tmethod := \"DELETE\"\n\n\treq, err := service.c.newRequest(method, path, nil, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tversion := strconv.Itoa(apiKey.Sys.Version)\n\treq.Header.Set(\"X-Contentful-Version\", version)\n\n\treturn service.c.do(req, nil)\n}", "title": "" }, { "docid": "eccdcc1a08ded9cf429fa32cff85fcf8", "score": "0.6572331", "text": "func DeleteUserKey(serviceID string, appID string, key string) error {\n\turl := InternalURL + \"/services/\" + serviceID + \"/applications/key/\" + key\n\tres, err := executeHTTPRequest(http.MethodDelete, url, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif res.StatusCode != 200 {\n\t\treturn fmt.Errorf(\"Failed to delete a user key for app(id: %s)\", appID)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1427fda47f6c4888b9d91d4700a5a4e4", "score": "0.6567929", "text": "func DeleteDeploykey(ctx *context.APIContext) {\n\t// swagger:operation DELETE /repos/{owner}/{repo}/keys/{id} repository repoDeleteKey\n\t// ---\n\t// summary: Delete a key from a repository\n\t// parameters:\n\t// - name: owner\n\t// in: path\n\t// description: owner of the repo\n\t// type: string\n\t// required: true\n\t// - name: repo\n\t// in: path\n\t// description: name of the repo\n\t// type: string\n\t// required: true\n\t// - name: id\n\t// in: path\n\t// description: id of the key to delete\n\t// type: integer\n\t// format: int64\n\t// required: true\n\t// responses:\n\t// \"204\":\n\t// \"$ref\": \"#/responses/empty\"\n\t// \"403\":\n\t// \"$ref\": \"#/responses/forbidden\"\n\n\tif err := asymkey_service.DeleteDeployKey(ctx.Doer, ctx.ParamsInt64(\":id\")); err != nil {\n\t\tif asymkey_model.IsErrKeyAccessDenied(err) {\n\t\t\tctx.Error(http.StatusForbidden, \"\", \"You do not have access to this key\")\n\t\t} else {\n\t\t\tctx.Error(http.StatusInternalServerError, \"DeleteDeployKey\", err)\n\t\t}\n\t\treturn\n\t}\n\n\tctx.Status(http.StatusNoContent)\n}", "title": "" }, { "docid": "7c8c512f735b4e1e17dd41dfa79aca6e", "score": "0.6544279", "text": "func KeyDelete(c *cli.Context) {\n\tclient := NewClient(c, DefaultConfig)\n\trawKey := c.String(ArgKey)\n\n\tvar err error\n\tif i, aerr := strconv.Atoi(rawKey); aerr == nil {\n\t\t_, err = client.Keys.DeleteByID(i)\n\t} else {\n\t\t_, err = client.Keys.DeleteByFingerprint(rawKey)\n\t}\n\n\tif err != nil {\n\t\tlogrus.WithField(\"err\", err).Fatal(\"could not retrieve key\")\n\t}\n}", "title": "" }, { "docid": "d1dd98dd24fed4bbcdfdc303d35e4203", "score": "0.65175253", "text": "func DeleteKey(settings *playfab.Settings, postData *DeleteAPIKeyRequestModel, entityToken string) (*DeleteAPIKeyResponseModel, error) {\n if entityToken == \"\" {\n return nil, playfab.NewCustomError(\"entityToken should not be an empty string\", playfab.ErrorGeneric)\n }\n b, errMarshal := json.Marshal(postData)\n if errMarshal != nil {\n return nil, playfab.NewCustomError(errMarshal.Error(), playfab.ErrorMarshal)\n }\n\n sourceMap, err := playfab.Request(settings, b, \"/APIKey/DeleteKey\", \"X-EntityToken\", entityToken)\n if err != nil {\n return nil, err\n }\n \n result := &DeleteAPIKeyResponseModel{}\n\n config := mapstructure.DecoderConfig{\n DecodeHook: playfab.StringToDateTimeHook,\n Result: result,\n }\n \n decoder, errDecoding := mapstructure.NewDecoder(&config)\n if errDecoding != nil {\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\n }\n \n errDecoding = decoder.Decode(sourceMap)\n if errDecoding != nil {\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\n }\n\n return result, nil\n}", "title": "" }, { "docid": "2c51ab3a67b13df0b7f8b5b345fb81b2", "score": "0.6317861", "text": "func (a *Client) RemoveAPIKeyPrivilege(params *RemoveAPIKeyPrivilegeParams, authInfo runtime.ClientAuthInfoWriter) (*RemoveAPIKeyPrivilegeOK, error) {\n\t// TODO: Validate the params before sending\n\tif params == nil {\n\t\tparams = NewRemoveAPIKeyPrivilegeParams()\n\t}\n\n\tresult, err := a.transport.Submit(&runtime.ClientOperation{\n\t\tID: \"removeApiKeyPrivilege\",\n\t\tMethod: \"DELETE\",\n\t\tPathPattern: \"/api/v1/apikeys/{key}/privileges\",\n\t\tProducesMediaTypes: []string{\"application/json\", \"application/xml\"},\n\t\tConsumesMediaTypes: []string{\"application/json\", \"application/xml\"},\n\t\tSchemes: []string{\"http\"},\n\t\tParams: params,\n\t\tReader: &RemoveAPIKeyPrivilegeReader{formats: a.formats},\n\t\tAuthInfo: authInfo,\n\t\tContext: params.Context,\n\t\tClient: params.HTTPClient,\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn result.(*RemoveAPIKeyPrivilegeOK), nil\n\n}", "title": "" }, { "docid": "d3fc2c6de5dba9d869c2ffe736a188ed", "score": "0.62840515", "text": "func (c *Client) DeleteClientKey(o Organization, p Project, k Key) error {\n\treturn c.do(\"DELETE\", fmt.Sprintf(\"projects/%s/%s/keys/%s\", *o.Slug, *p.Slug, k.ID), nil, nil)\n}", "title": "" }, { "docid": "a467c1e8a5ba63605ec2f5d1f2f93249", "score": "0.6146603", "text": "func DeleteKey(key []byte) error {\n\tcurrDb, err := GetDb()\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn currDb.Update(func(txn *badger.Txn) error {\n\t\treturn txn.Delete(key)\n\t})\n}", "title": "" }, { "docid": "2b592d7ebb6372682124fb056433df27", "score": "0.61348194", "text": "func (a *ZonecryptokeyApiService) DeleteCryptokey(ctx context.Context, serverId string, zoneId string, cryptokeyId string) ( *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/servers/{server_id}/zones/{zone_id}/cryptokeys/{cryptokey_id}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"server_id\"+\"}\", fmt.Sprintf(\"%v\", serverId), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"zone_id\"+\"}\", fmt.Sprintf(\"%v\", zoneId), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"cryptokey_id\"+\"}\", fmt.Sprintf(\"%v\", cryptokeyId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{ \"application/json\", }\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\n\t\t\"application/json\",\n\t\t}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"X-API-Key\"] = key\n\t\t}\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\tdefer localVarHttpResponse.Body.Close()\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tbodyBytes, _ := ioutil.ReadAll(localVarHttpResponse.Body)\n\t\treturn localVarHttpResponse, reportError(\"Status: %v, Body: %s\", localVarHttpResponse.Status, bodyBytes)\n\t}\n\n\treturn localVarHttpResponse, err\n}", "title": "" }, { "docid": "a42643fac9c4bba5e713dd98f8146fbb", "score": "0.60815376", "text": "func (r *DeleteNotificationRequest) GetApiKey() string {\n\treturn r.ApiKey\n}", "title": "" }, { "docid": "6034009e03caea8438c885253cff904c", "score": "0.60096896", "text": "func (a *APIKeys) Remove(apiKey string) (err error) {\n\treturn a.m.Remove(apiKey)\n}", "title": "" }, { "docid": "0691145e31e84bf2d8554be97b16d452", "score": "0.5989341", "text": "func (c *GateManagementClient) DeleteKey(key string) (interface{}, error) {\n\tvar client http.Client\n\trequest, err := http.NewRequest(\"DELETE\", fmt.Sprintf(\"%s/%s\", c.GateManagerUrl, key), nil)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresponse, httpErr := client.Do(request)\n\treturn c.ProcessResponse(response, httpErr)\n}", "title": "" }, { "docid": "767f26500ca4e075b2a0dd63fe7bcb27", "score": "0.598301", "text": "func (i *IamServiceAccountClient) deleteKey(fullKeyName string) error {\n\tvar err error\n\t_, err = i.service.Projects.ServiceAccounts.Keys.Delete(fullKeyName).Do()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Projects.ServiceAccounts.Keys.Delete: %v\", err)\n\t}\n\tlog.Infof(\"Deleted key: %v\", fullKeyName)\n\treturn nil\n}", "title": "" }, { "docid": "29dad10ab1539a1c2dccd10059477f48", "score": "0.598156", "text": "func DeleteKey(client *github.Client, owner, name, title string) error {\n\tvar k, err = GetKey(client, owner, name, title)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif k == nil {\n\t\treturn nil\n\t}\n\t_, err = client.Repositories.DeleteKey(owner, name, *k.ID)\n\treturn err\n}", "title": "" }, { "docid": "f5c65973ef396adf35f46b005027e340", "score": "0.5978814", "text": "func DeleteServiceKey(cliConnection plugin.CliConnection, serviceKeyGUID string) error {\n\tvar err error\n\tvar url string\n\n\turl = \"/v2/service_keys/\" + serviceKeyGUID\n\tlog.Tracef(\"Making request to: %s\\n\", url)\n\t_, err = cliConnection.CliCommandWithoutTerminalOutput(\"curl\", url, \"-X\", \"DELETE\")\n\n\treturn err\n}", "title": "" }, { "docid": "d8aef582a67a27f1b3601c3c3297e558", "score": "0.59385717", "text": "func (s *ErrorTrackingService) DeleteClientKey(pid interface{}, keyID int, options ...RequestOptionFunc) (*Response, error) {\n\tproject, err := parseID(pid)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tu := fmt.Sprintf(\"projects/%s/error_tracking/client_keys/%d\", PathEscape(project), keyID)\n\n\treq, err := s.client.NewRequest(http.MethodDelete, u, nil, options)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s.client.Do(req, nil)\n}", "title": "" }, { "docid": "ffa2aabfd93dc6b09ac661bdc81756b8", "score": "0.59123", "text": "func (c *Client) DeleteKey() error {\n\tif err := c.checkRequiredAPIVersion(responses.GenericVersionedResponse{}); err != nil {\n\t\treturn err\n\t}\n\treturn fmt.Errorf(\"not yet implemented\")\n}", "title": "" }, { "docid": "7fe7c5d71de69ffcbc5c15591cb04f9f", "score": "0.5901588", "text": "func (c *Client) DeleteKey(ctx context.Context, name string) error {\n\tclient := retry(c.HTTPClient)\n\tresp, err := client.Send(ctx, http.MethodDelete, c.Endpoints, path.Join(\"/v1/key/delete\", url.PathEscape(name)), nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif resp.StatusCode != http.StatusOK {\n\t\treturn parseErrorResponse(resp)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3467dad0cc16e177d4ae787396572538", "score": "0.59012806", "text": "func (a *UserApiService) SSHKeyRemove(ctx context.Context, key string) (*http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/1.0/users/keys/{key}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"key\"+\"}\", fmt.Sprintf(\"%v\", key), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif strlen(key) < 1 {\n\t\treturn nil, reportError(\"key must have at least 1 elements\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"*/*\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tif ctx != nil {\n\t\t// API Key Authentication\n\t\tif auth, ok := ctx.Value(ContextAPIKey).(APIKey); ok {\n\t\t\tvar key string\n\t\t\tif auth.Prefix != \"\" {\n\t\t\t\tkey = auth.Prefix + \" \" + auth.Key\n\t\t\t} else {\n\t\t\t\tkey = auth.Key\n\t\t\t}\n\t\t\tlocalVarHeaderParams[\"Authorization\"] = key\n\t\t}\n\t}\n\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarHttpResponse, err\n\t}\n\n\tvar localVarBody []byte\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t\tstatusCode: localVarHttpResponse.StatusCode,\n\t\t}\n\n\t\tlocalVarBody, err = ioutil.ReadAll(localVarHttpResponse.Body)\n\t\tlocalVarHttpResponse.Body.Close()\n\t\tif err == nil {\n\t\t\tnewErr.body = localVarBody\n\t\t}\n\n\t\tif localVarHttpResponse.StatusCode == 400 {\n\t\t\tvar v string\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 401 {\n\t\t\tvar v string\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\tif localVarHttpResponse.StatusCode == 404 {\n\t\t\tvar v string\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarHttpResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t\treturn localVarHttpResponse, newErr\n\t\t}\n\t\treturn localVarHttpResponse, newErr\n\t}\n\n\treturn localVarHttpResponse, nil\n}", "title": "" }, { "docid": "cc236e78a96fb97b53b2c72cffc0ee2c", "score": "0.58817536", "text": "func (cs *CacheableManager) DeleteKey(moduleID string, key string) error {\n\tmodule, err := cs.FindModule(moduleID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn module.Delete(key)\n}", "title": "" }, { "docid": "f9a80f6882a7939890b168d0a5c7beb0", "score": "0.58642423", "text": "func DeleteConfigKey(w http.ResponseWriter, r *http.Request) {\n\thr := HTTPResponse{w}\n\tconfig, ok := getConfigHelper(hr, r)\n\tif !ok {\n\t\treturn\n\t}\n\n\tvars := mux.Vars(r)\n\tconfig.DeleteValue(vars[\"namespace\"], vars[\"key\"])\n\n\tif !saveConfigHelper(hr, config) {\n\t\treturn\n\t}\n\thr.JSON(http.StatusOK, config.GetNamespace(vars[\"namespace\"]))\n\n}", "title": "" }, { "docid": "f95e9ae172fb86c6281be67b1397a7f5", "score": "0.5862156", "text": "func (cmd *KeyCmd) Delete(args []string) error {\n\tctx := context.Background()\n\terr := cmd.Authenticate(ctx)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn cmd.User().Extensions().ID(cmd.ExtensionName).Request().Delete(ctx)\n}", "title": "" }, { "docid": "2f9fc6ee5e439ead4558bb425fe6dc81", "score": "0.5859724", "text": "func DeleteKey(data interface{}, key string) error {\n\tp, err := jsonPtr(key)\n\tif err != nil {\n\t\treturn err\n\t}\n\t_, err = p.Delete(data)\n\treturn err\n}", "title": "" }, { "docid": "3e5a54bf2ec092ee0ad62ebd1079a700", "score": "0.5855441", "text": "func RemoveKey(w http.ResponseWriter, r *http.Request) {\n\tkey := context.Get(r, \"accessKey\").(db.AccessKey)\n\n\tvar err error\n\n\terr = helpers.Store(r).DeleteAccessKey(*key.ProjectID, key.ID)\n\tif err == db.ErrInvalidOperation {\n\t\thelpers.WriteJSON(w, http.StatusBadRequest, map[string]interface{}{\n\t\t\t\"error\": \"Access Key is in use by one or more templates\",\n\t\t\t\"inUse\": true,\n\t\t})\n\t\treturn\n\t}\n\n\tif err != nil {\n\t\thelpers.WriteError(w, err)\n\t\treturn\n\t}\n\n\tuser := context.Get(r, \"user\").(*db.User)\n\n\tdesc := \"Access Key \" + key.Name + \" deleted\"\n\n\t_, err = helpers.Store(r).CreateEvent(db.Event{\n\t\tUserID: &user.ID,\n\t\tProjectID: key.ProjectID,\n\t\tDescription: &desc,\n\t})\n\n\tif err != nil {\n\t\tlog.Error(err)\n\t}\n\n\tw.WriteHeader(http.StatusNoContent)\n}", "title": "" }, { "docid": "85821674259b2fb1133ba02dcb037730", "score": "0.58329946", "text": "func DeleteApplicationKey(serviceID string, appID string, key string) error {\n\turl := InternalURL + \"/services/\" + serviceID + \"/applications/\" + appID + \"/keys/\" + key\n\tres, err := executeHTTPRequest(http.MethodDelete, url, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif res.StatusCode != 200 {\n\t\treturn fmt.Errorf(\"Failed to delete the application key(app_id: %s, key: %s)\", appID, key)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e2ebb64950023972f24a2afbe4cbbac5", "score": "0.5828971", "text": "func deleteUser_key(client *chef.Client, name string) (err error) {\n\terr = client.Users.Delete(name)\n\tif err != nil {\n\t\tfmt.Fprintln(os.Stderr, \"Issue deleting org:\", err)\n\t}\n\treturn\n}", "title": "" }, { "docid": "e0c0914222badd622a472075099df837", "score": "0.5828274", "text": "func (g *LiveDNS) DeleteDomainKey(fqdn, uuid string) (err error) {\n\t_, err = g.client.Delete(\"domains/\"+fqdn+\"/keys/\"+uuid, nil, nil)\n\treturn\n}", "title": "" }, { "docid": "783ba7776a1238ac187bbbedb6840693", "score": "0.57973605", "text": "func DeleteEnvironmentKey(db gorp.SqlExecutor, envID int64, keyName string) error {\n\t_, err := db.Exec(\"DELETE FROM environment_key WHERE environment_id = $1 AND name = $2\", envID, keyName)\n\treturn sdk.WrapError(err, \"Cannot delete key %s\", keyName)\n}", "title": "" }, { "docid": "6da015bd349562ae0d7e31c27b179191", "score": "0.5713375", "text": "func (kc *kmipClient) DeleteKey(keyID string) error {\n\tdefaultLog.Trace(\"kmipclient/kmipclient:DeleteKey() Entering\")\n\tdefer defaultLog.Trace(\"kmipclient/kmipclient:DeleteKey() Leaving\")\n\n\tdeleteRequestPayLoad := models.DeleteRequest{\n\t\tUniqueIdentifier: kmip20.UniqueIdentifierValue{\n\t\t\tText: keyID,\n\t\t},\n\t}\n\n\t_, _, err := kc.SendRequest(deleteRequestPayLoad, kmip14.OperationDestroy)\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"failed to perform delete key operation\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1fee68f79a8f82fb50ab8f6359fb8213", "score": "0.5705383", "text": "func DeleteDeployKey(doer *User, id int64) error {\n\tkey, err := GetDeployKeyByID(id)\n\tif err != nil {\n\t\tif IsErrDeployKeyNotExist(err) {\n\t\t\treturn nil\n\t\t}\n\t\treturn fmt.Errorf(\"GetDeployKeyByID: %v\", err)\n\t}\n\n\t// Check if user has access to delete this key.\n\tif !doer.IsAdmin {\n\t\trepo, err := GetRepositoryByID(key.RepoID)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"GetRepositoryByID: %v\", err)\n\t\t}\n\t\tif !Perms.Authorize(context.TODO(), doer.ID, repo.ID, AccessModeAdmin,\n\t\t\tAccessModeOptions{\n\t\t\t\tOwnerID: repo.OwnerID,\n\t\t\t\tPrivate: repo.IsPrivate,\n\t\t\t},\n\t\t) {\n\t\t\treturn ErrKeyAccessDenied{doer.ID, key.ID, \"deploy\"}\n\t\t}\n\t}\n\n\tsess := x.NewSession()\n\tdefer sess.Close()\n\tif err = sess.Begin(); err != nil {\n\t\treturn err\n\t}\n\n\tif _, err = sess.ID(key.ID).Delete(new(DeployKey)); err != nil {\n\t\treturn fmt.Errorf(\"delete deploy key [%d]: %v\", key.ID, err)\n\t}\n\n\t// Check if this is the last reference to same key content.\n\thas, err := sess.Where(\"key_id = ?\", key.KeyID).Get(new(DeployKey))\n\tif err != nil {\n\t\treturn err\n\t} else if !has {\n\t\tif err = deletePublicKeys(sess, key.KeyID); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn sess.Commit()\n}", "title": "" }, { "docid": "d36dc2ae3432d149ef60f018566654b3", "score": "0.56674343", "text": "func (r *KeyResource) Delete(account string, id int) error {\n\tpath := fmt.Sprintf(\"/users/%s/ssh-keys/%v\", account, id)\n\treturn r.client.do(\"DELETE\", path, nil, nil, nil)\n}", "title": "" }, { "docid": "0f5f57ba42bac80635bc87ba4e05e74a", "score": "0.5660743", "text": "func (o *OpsGenieNotificationConfigAllOf) SetApiKey(v string) {\n\to.ApiKey = &v\n}", "title": "" }, { "docid": "9c7b4e4426fb50298bf865c4ddb9b5a5", "score": "0.5628491", "text": "func (a *APIKeysApiService) UpdateApiKey(ctx context.Context, name string, user string) ApiUpdateApiKeyRequest {\n\treturn ApiUpdateApiKeyRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tname: name,\n\t\tuser: user,\n\t}\n}", "title": "" }, { "docid": "d37c85dca7138e00ac3334a155808f14", "score": "0.562409", "text": "func (o *FastlyAccountCreateRequestAttributes) SetApiKey(v string) {\n\to.ApiKey = v\n}", "title": "" }, { "docid": "b03894d7fa411e71e9976ac73142bf5c", "score": "0.55984163", "text": "func (s *BaiduChannelRequest) SetApiKey(v string) *BaiduChannelRequest {\n\ts.ApiKey = &v\n\treturn s\n}", "title": "" }, { "docid": "10983510f674352050ac692fcc8e818b", "score": "0.55934566", "text": "func (c *Crypto) DeleteClientKey(clientID t.ClientID) {\n\tdelete(c.clientKeys, clientID)\n}", "title": "" }, { "docid": "269203a12c9e3474157937a9e5c734ad", "score": "0.5564422", "text": "func (s *GCMChannelRequest) SetApiKey(v string) *GCMChannelRequest {\n\ts.ApiKey = &v\n\treturn s\n}", "title": "" }, { "docid": "091751a1bd3b206bdb8442d992ea990d", "score": "0.5555186", "text": "func (o *OrganizationCreateResponse) SetApiKey(v ApiKey) {\n\to.ApiKey = &v\n}", "title": "" }, { "docid": "042cd2a547ffa90f623778c4f2de5584", "score": "0.5537457", "text": "func (b Blobs) DeleteKey(uuid, key string) error {\n\tswitch key {\n\tcase KeyName, KeyUpdated:\n\t\treturn keyNotAllowed(key)\n\t}\n\n\tb.touchUpdated(uuid)\n\tb.DB.DeleteKey(uuid, key)\n\treturn nil\n}", "title": "" }, { "docid": "3bc368be5d0844484adb1663372b2512", "score": "0.5537085", "text": "func TestDeleteKey(t *testing.T) {\n\tTestSchemaKV.DeleteKeys(\"show-all-windows-on-click\") // Delete show-all-windows-on-click\n\n\tif TestSchemaKV.HasKey(\"show-all-windows-on-click\") {\n\t\tt.Error(\"Failed to delete show-all-windows-on-click\")\n\t}\n}", "title": "" }, { "docid": "e76302979273c7016a2d7e418bab0c80", "score": "0.55189604", "text": "func (a *APIKeysApiService) GetApiKey(ctx context.Context, user string, name string) ApiGetApiKeyRequest {\n\treturn ApiGetApiKeyRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\tuser: user,\n\t\tname: name,\n\t}\n}", "title": "" }, { "docid": "1c6f0e5a6a3bf9f136fc9093b4bec657", "score": "0.5515964", "text": "func DeleteKeyCommand() *gcli.Command {\n\tcmd := &gcli.Command{\n\t\tName: \"delete\",\n\t\tDesc: \"Delete the given keys\",\n\t\tHelp: `Delete keys from the Keybase backend.\n\nNote that removing offline or ledger keys will remove\nonly the public key references stored locally, i.e.\nprivate keys stored in a ledger device cannot be deleted with the CLI.\n`,\n\t\tConfig: func(cmd *gcli.Command) {\n\t\t\tflags.AddKeysFlags(cmd)\n\n\t\t\tcmd.BoolOpt(&deleteOpts.Yes, flagYes, \"y\", false,\n\t\t\t\t\"Skip confirmation prompt when deleting offline or ledger key references\")\n\t\t\tcmd.BoolOpt(&deleteOpts.Force, flagForce, \"f\", false,\n\t\t\t\t\"Remove the key unconditionally without asking for the passphrase. Deprecated.\")\n\n\t\t\tcmd.AddArg(\"name\", \"name of the key\", true, true)\n\t\t},\n\t\tFunc: func(cmd *gcli.Command, args []string) error {\n\t\t\tclientCtx, err := client.GetClientQueryContext()\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\n\t\t\tfor _, name := range args {\n\t\t\t\tinfo, err := clientCtx.Keyring.Key(name)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\t// confirm deletion, unless -y is passed\n\t\t\t\tif !deleteOpts.Yes {\n\t\t\t\t\tif yes := interact.Confirm(\"Key reference will be deleted. Continue?\"); !yes {\n\t\t\t\t\t\tcontinue\n\t\t\t\t\t}\n\t\t\t\t}\n\n\t\t\t\tif err := clientCtx.Keyring.Delete(name); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\n\t\t\t\tif info.GetType() == keyring.TypeLedger || info.GetType() == keyring.TypeOffline {\n\t\t\t\t\tcmd.Errorln(\"Public key reference deleted\")\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t\tcmd.Errorln(\"Key deleted forever (uh oh!)\")\n\t\t\t}\n\n\t\t\treturn nil\n\t\t},\n\t}\n\n\treturn cmd\n}", "title": "" }, { "docid": "b2f4c5463c53625911f7135ec2e7d27a", "score": "0.55004865", "text": "func (c *Client) DeleteAccessKey(ctx context.Context, repo bitbucket.Repo, id int) error {\n\turl := c.BaseURL + fmt.Sprintf(\"/rest/keys/1.0/projects/%s/repos/%s/ssh/%d\",\n\t\turl.PathEscape(repo.ProjectKey), url.PathEscape(repo.Repo), id)\n\treq, err := http.NewRequestWithContext(ctx, http.MethodDelete, url, nil)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn c.sendRequest(req, nil)\n}", "title": "" }, { "docid": "ce5772c6c6bc8aff4141578f7f497d02", "score": "0.5475309", "text": "func (p *UserAgentKVPlugin) DeleteKey(\n\tctx context.Context, request *DeleteKeyRequest,\n) (*types.Empty, error) {\n\treturn &types.Empty{}, p.UserAgentKVService.DeleteKey(ctx, request.Key)\n}", "title": "" }, { "docid": "2fbff8430d91555f25d2b9cd6002f1b7", "score": "0.5467526", "text": "func (as *ApiService) SubApiKey(subName, apiKey string) (*ApiResponse, error) {\n\tp := map[string]string{\n\t\t\"apiKey\": apiKey,\n\t\t\"subName\": subName,\n\t}\n\treq := NewRequest(http.MethodGet, \"/api/v1/sub/api-key\", p)\n\treturn as.Call(req)\n}", "title": "" }, { "docid": "018e71249888844591fb57217767c8e7", "score": "0.54660726", "text": "func (s *RedisAuthenticator) DeleteKey(key string) error {\n\tconn := s.pool.Get()\n\tdefer conn.Close()\n\n\treply, err := redis.Int(conn.Do(\"DEL\", key))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif 0 == reply {\n\t\treturn ErrNoKey\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e9cc6fb65725d59a71750883ab8af0c0", "score": "0.5458392", "text": "func (me *CUSTOMERS_IMPL) DeleteAccessToken (\r\n customerId string,\r\n tokenId string,\r\n idempotencyKey *string) (*models_pkg.CustomersAccessTokensResponse, error) {\r\n //the endpoint path uri\r\n _pathUrl := \"/customers/{customer_id}/access-tokens/{token_id}\"\r\n\r\n //variable to hold errors\r\n var err error = nil\r\n //process optional template parameters\r\n _pathUrl, err = apihelper_pkg.AppendUrlWithTemplateParameters(_pathUrl, map[string]interface{} {\r\n \"customer_id\" : customerId,\r\n \"token_id\" : tokenId,\r\n })\r\n if err != nil {\r\n //error in template param handling\r\n return nil, err\r\n }\r\n\r\n //the base uri for api requests\r\n _queryBuilder := configuration_pkg.BASEURI;\r\n\r\n //prepare query string for API call\r\n _queryBuilder = _queryBuilder + _pathUrl\r\n\r\n //validate and preprocess url\r\n _queryBuilder, err = apihelper_pkg.CleanUrl(_queryBuilder)\r\n if err != nil {\r\n //error in url validation or cleaning\r\n return nil, err\r\n }\r\n //prepare headers for the outgoing request\r\n headers := map[string]interface{} {\r\n \"user-agent\" : \"MundiSDK - Go 2.4.5\",\r\n \"accept\" : \"application/json\",\r\n \"idempotency-key\" : apihelper_pkg.ToString(idempotencyKey, \"\"),\r\n }\r\n\r\n //prepare API request\r\n _request := unirest.DeleteWithAuth(_queryBuilder, headers, nil, me.config.BasicAuthUserName(), me.config.BasicAuthPassword())\r\n //and invoke the API call request to fetch the response\r\n _response, err := unirest.AsString(_request,false);\r\n if err != nil {\r\n //error in API invocation\r\n return nil, err\r\n }\r\n\r\n //error handling using HTTP status codes\r\n if (_response.Code == 400) {\r\n err = apihelper_pkg.NewAPIError(\"Invalid request\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 401) {\r\n err = apihelper_pkg.NewAPIError(\"Invalid API key\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 404) {\r\n err = apihelper_pkg.NewAPIError(\"An informed resource was not found\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 412) {\r\n err = apihelper_pkg.NewAPIError(\"Business validation error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 422) {\r\n err = apihelper_pkg.NewAPIError(\"Contract validation error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code == 500) {\r\n err = apihelper_pkg.NewAPIError(\"Internal server error\", _response.Code, _response.RawBody)\r\n } else if (_response.Code < 200) || (_response.Code > 206) { //[200,206] = HTTP OK\r\n err = apihelper_pkg.NewAPIError(\"HTTP Response Not OK\", _response.Code, _response.RawBody)\r\n }\r\n if(err != nil) {\r\n //error detected in status code validation\r\n return nil, err\r\n }\r\n\r\n //returning the response\r\n var retVal *models_pkg.CustomersAccessTokensResponse = &models_pkg.CustomersAccessTokensResponse{}\r\n err = json.Unmarshal(_response.RawBody, &retVal)\r\n\r\n if err != nil {\r\n //error in parsing\r\n return nil, err\r\n }\r\n return retVal, nil\r\n\r\n}", "title": "" }, { "docid": "ec4097fff6ff28a23d3b7c797a017cee", "score": "0.5426351", "text": "func (o *AuthResWeb) SetApiKey(v ApiKey) {\n\to.ApiKey = &v\n}", "title": "" }, { "docid": "b7c911e34b6c91cb04864a51c3c76b51", "score": "0.5416287", "text": "func (b *Backend) Delete(ctx context.Context, key []byte) error {\n\tif len(key) == 0 {\n\t\treturn trace.BadParameter(\"missing parameter key\")\n\t}\n\tif _, err := b.getKey(ctx, key); err != nil {\n\t\treturn err\n\t}\n\treturn b.deleteKey(ctx, key)\n}", "title": "" }, { "docid": "dc16ad7546d861ca3e7b351b13f2062b", "score": "0.54112995", "text": "func (o *OrganizationCreateResponse) GetApiKey() ApiKey {\n\tif o == nil || o.ApiKey == nil {\n\t\tvar ret ApiKey\n\t\treturn ret\n\t}\n\treturn *o.ApiKey\n}", "title": "" }, { "docid": "a4790b5329b63487ae07be4a0023ce7c", "score": "0.5400114", "text": "func (s *Shell) DeleteP2PKey(c *cli.Context) (err error) {\n\tif !c.Args().Present() {\n\t\treturn s.errorOut(errors.New(\"Must pass the key ID to be deleted\"))\n\t}\n\tid := c.Args().Get(0)\n\n\tif !confirmAction(c) {\n\t\treturn nil\n\t}\n\n\tvar queryStr string\n\tif c.Bool(\"hard\") {\n\t\tqueryStr = \"?hard=true\"\n\t}\n\n\tresp, err := s.HTTP.Delete(fmt.Sprintf(\"/v2/keys/p2p/%s%s\", id, queryStr))\n\tif err != nil {\n\t\treturn s.errorOut(err)\n\t}\n\tdefer func() {\n\t\tif cerr := resp.Body.Close(); cerr != nil {\n\t\t\terr = multierr.Append(err, cerr)\n\t\t}\n\t}()\n\n\treturn s.renderAPIResponse(resp, &P2PKeyPresenter{}, \"P2P key deleted\")\n}", "title": "" }, { "docid": "68dd483c948693b216702ad1653122c8", "score": "0.5376708", "text": "func (ah *ApiHandler) Delete(params *data.ApiRequestParams) error {\n\tidentifier, err := params.Identifier()\n\n\tif err != nil {\n\t\treturn errors.Wrap(err, \"You must provide an ID or Name to delete an Api\")\n\t}\n\n\tpath := fmt.Sprintf(\"%s/%s\", apisRootPath, identifier)\n\n\trequest, err := ah.Kong.Client.Delete(path).Request()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t_, err = ah.Kong.Client.Do(request, nil, nil)\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "41f33943fdddb8abdb722ca7e8162b3e", "score": "0.5373555", "text": "func (c *Client) RemoveKey(ctx context.Context, uName, kName string) error {\n\turl := fmt.Sprintf(\"/user/%s/key/%s\", uName, kName)\n\treturn c.delete(ctx, nil, url)\n}", "title": "" }, { "docid": "d11218263dd4be559a86de05b4fdb825", "score": "0.536233", "text": "func (c *Client) DeleteAllKey(ctx context.Context, project string, filter func(*Key) bool) error {\n\tlistObj, err := c.ListKey(ctx, project)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\terr = c.deleteAllKey(ctx, filter, listObj.Items)\n\tif err != nil {\n\t\treturn err\n\t}\n\tfor listObj.HasNext() {\n\t\terr = listObj.Next(ctx, c)\n\t\tif err != nil {\n\t\t\treturn nil\n\t\t}\n\t\terr = c.deleteAllKey(ctx, filter, listObj.Items)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3ab0ff060ec8636e8ab574100b44e974", "score": "0.5361578", "text": "func (c *cache) DeleteKey(ctx context.Context, args *api.GetKey) (*api.Success, error) {\n\tc.mu.Lock()\n\tc.delete(args.Key)\n\tc.mu.Unlock()\n\treturn &api.Success{\n\t\tSuccess: true,\n\t}, nil\n}", "title": "" }, { "docid": "fc305dd1fc40e49ee8266082d773d1a5", "score": "0.5353594", "text": "func (api *API) exportKey(c *gin.Context) {\n\tusername, err := GetAuthenticatedUserFromContext(c)\n\tif err != nil {\n\t\tapi.LogError(c, err, eh.NoAPITokenError)(http.StatusBadRequest)\n\t\treturn\n\t}\n\t// get the key name\n\tkeyName := c.Param(\"name\")\n\t// validate user owns key name\n\tif owns, err := api.um.CheckIfKeyOwnedByUser(username, keyName); err != nil {\n\t\tapi.LogError(c, err, eh.KeySearchError)(http.StatusBadRequest)\n\t\treturn\n\t} else if !owns {\n\t\tapi.LogError(c, errors.New(eh.KeyUseError), eh.KeyUseError)(http.StatusBadRequest)\n\t\treturn\n\t}\n\t// get private key from krab keystore\n\tresp, err := api.keys.kb1.GetPrivateKey(context.Background(), &pb.KeyGet{Name: keyName})\n\tif err != nil {\n\t\tapi.LogError(c, err, eh.KeyExportError)(http.StatusBadRequest)\n\t\treturn\n\t}\n\t// convert private key to mnemonic phrase\n\tphrase, err := mnemonics.ToPhrase(resp.PrivateKey, mnemonics.English)\n\tif err != nil {\n\t\tapi.LogError(c, err, eh.KeyExportError)(http.StatusBadRequest)\n\t\treturn\n\t}\n\t// after successful parsing delete key from krab primary\n\tif resp, err := api.keys.kb1.DeletePrivateKey(context.Background(), &pb.KeyDelete{Name: keyName}); err != nil {\n\t\tapi.l.Warnw(\"failed to delete key from primary krab\", \"error\", err.Error())\n\t} else if resp.Status != \"private key deleted\" {\n\t\tapi.l.Warnw(\"bad status from primary krab key delete\", \"status\", resp.Status)\n\t}\n\t// only delete from secondary krab keystore if we arent in dev mode\n\tif !dev {\n\t\t// after successful parsing delete key from krab fallback\n\t\tif resp, err := api.keys.kb2.DeletePrivateKey(context.Background(), &pb.KeyDelete{Name: keyName}); err != nil {\n\t\t\tapi.l.Warnw(\"failed to delete key from backup krab\", \"error\", err.Error())\n\t\t} else if resp.Status != \"private key deleted\" {\n\t\t\tapi.l.Warnw(\"bad status from backup krab key delete\", \"status\", resp.Status)\n\t\t}\n\t}\n\t// get key id from database\n\tkeyID, err := api.um.GetKeyIDByName(username, keyName)\n\tif err != nil {\n\t\tapi.LogError(c, err, eh.KeySearchError)(http.StatusBadRequest)\n\t\treturn\n\t}\n\t// remove key id from database\n\tif err := api.um.RemoveIPFSKeyForUser(username, keyName, keyID); err != nil {\n\t\tapi.LogError(c, err, \"failed to remove key from database\")(http.StatusBadRequest)\n\t\treturn\n\t}\n\t// decrease key count\n\tif err := api.usage.ReduceKeyCount(username, 1); err != nil {\n\t\tapi.LogError(c, err, \"failed to decrease key count\")(http.StatusBadRequest)\n\t\treturn\n\t}\n\t// return\n\tRespond(c, http.StatusOK, gin.H{\"response\": phrase})\n}", "title": "" }, { "docid": "081c9618c1078ab4af9bce286febcc59", "score": "0.5345345", "text": "func (c *Client) SetApiKey(key string) {\n\tc.ApiKey = key\n}", "title": "" }, { "docid": "c54919b4f2a4bd50a5af3cb9b670866b", "score": "0.53373873", "text": "func (t *TestRedis) TestDeleteKey(key string) {\n\tif err := t.client.Del(t.ctx, key).Err(); err != nil {\n\t\tt.errHandler(err)\n\t}\n\tfmt.Printf(\"success delete key=%s\\n\", key)\n}", "title": "" }, { "docid": "32b616decda4c4634962240fabf843ca", "score": "0.52892435", "text": "func ValidateAPIKey(apikey string) (*ValidateSuccessResponse, error) {\n\tapikeyEndpoint := PkghubBaseURL + \"/apikeys/validate\"\n\treq, err := BaseHTTPRequest(\"POST\", apikeyEndpoint, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq.Header.Add(APIKeyHeader, apikey)\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif resp.StatusCode == 200 {\n\t\tsuccessResp := ValidateSuccessResponse{}\n\t\terr = json.NewDecoder(resp.Body).Decode(&successResp)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn &successResp, nil\n\t} else if resp.StatusCode == 403 {\n\t\treturn nil, errors.New(\"incorrect api-key\")\n\t} else {\n\t\t// at this point its mostly a internal server error\n\t\treason, err := io.ReadAll(resp.Body)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn nil, errors.New(string(reason))\n\t}\n\n}", "title": "" }, { "docid": "1493dde13cfec98da1847aea62030f18", "score": "0.5279305", "text": "func (s *apiKeyBindingFactory) Delete(apiKeyBinding *v2.ApiKeyBinding) error {\n\ts.mutex.Lock()\n\tdefer s.mutex.Unlock()\n\tif apiKeyBinding == nil {\n\t\treturn nil\n\t}\n\t_, ok := s.apiKeyBindingMap[apiKeyBinding.GetNamespace()][apiKeyBinding.GetName()]\n\tif !ok {\n\t\treturn errors.New(\"ApiKeyBinding not found\")\n\t}\n\tdelete(s.apiKeyBindingMap[apiKeyBinding.GetNamespace()], apiKeyBinding.GetName())\n\tif len(s.apiKeyBindingMap[apiKeyBinding.GetNamespace()]) == 0 {\n\t\tdelete(s.apiKeyBindingMap, apiKeyBinding.GetNamespace())\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d0c901d139948e0c18fec7545e9b6592", "score": "0.52732456", "text": "func (cli *Client) DeleteVRFKey(c *cli.Context) error {\n\tif !c.Args().Present() {\n\t\treturn cli.errorOut(errors.New(\"Must pass the key ID (compressed public key) to be deleted\"))\n\t}\n\tid, err := getPublicKey(c)\n\tif err != nil {\n\t\treturn cli.errorOut(err)\n\t}\n\n\tif !confirmAction(c) {\n\t\treturn nil\n\t}\n\n\tvar queryStr string\n\tif c.Bool(\"hard\") {\n\t\tqueryStr = \"?hard=true\"\n\t}\n\n\tresp, err := cli.HTTP.Delete(fmt.Sprintf(\"/v2/keys/vrf/%s%s\", id, queryStr))\n\tif err != nil {\n\t\treturn cli.errorOut(err)\n\t}\n\tdefer func() {\n\t\tif cerr := resp.Body.Close(); cerr != nil {\n\t\t\terr = multierr.Append(err, cerr)\n\t\t}\n\t}()\n\n\tvar presenter VRFKeyPresenter\n\treturn cli.renderAPIResponse(resp, &presenter, \"VRF key deleted\")\n}", "title": "" }, { "docid": "5ec5ea26b9b8601bd6a1881ac1d2f8ff", "score": "0.5270238", "text": "func Delete(c context.Context, key string) error {\n\treturn singleError(DeleteMulti(c, []string{key}))\n}", "title": "" }, { "docid": "07e277838be3ed37072377eb2da2dba3", "score": "0.52690417", "text": "func (d *KeycodeRepository) DeleteKeycode(keycode string) error {\n\treturn nil\n}", "title": "" }, { "docid": "b2cbd2344a2d01ba25a38079dd01f575", "score": "0.52623653", "text": "func (iam *IAM) DeleteAccessKey(id, userName string) (*SimpleResp, error) {\n\tparams := map[string]string{\n\t\t\"Action\": \"DeleteAccessKey\",\n\t\t\"AccessKeyId\": id,\n\t}\n\tif userName != \"\" {\n\t\tparams[\"UserName\"] = userName\n\t}\n\tresp := new(SimpleResp)\n\tif err := iam.query(params, resp); err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "bfbf4f1375f99a87fdc6c5847dc7d690", "score": "0.5260982", "text": "func (p *SSHKeyProvider) Delete(userInfo *provider.UserInfo, keyName string) error {\n\tmasterImpersonatedClient, err := createImpersonationClientWrapperFromUserInfo(userInfo, p.createMasterImpersonatedClient)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn masterImpersonatedClient.Delete(context.Background(), &kubermaticapiv1.UserSSHKey{ObjectMeta: metav1.ObjectMeta{Name: keyName}})\n}", "title": "" }, { "docid": "b35fcc03fac1750a5dd6425b6b7350fa", "score": "0.52587914", "text": "func (a *APIKeysApiService) CreateApiKey(ctx context.Context) ApiCreateApiKeyRequest {\n\treturn ApiCreateApiKeyRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t}\n}", "title": "" }, { "docid": "6c87fff316bd05d523d79a092bd1ad8d", "score": "0.5249652", "text": "func (c *Client) SetApiKey(key string) {\n\tc.apiKey = key\n}", "title": "" }, { "docid": "7e2122ca7444d1f668dd6bbdcb3c7acf", "score": "0.5233778", "text": "func (o *FastlyAccountCreateRequestAttributes) GetApiKey() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn o.ApiKey\n}", "title": "" }, { "docid": "e8f423ad58240dd22e88379628b91883", "score": "0.52308476", "text": "func DeleteKey(c *gin.Context) {\n\tsearch := viper.GetStringSlice(\"estate.search\")\n\n\tst, err := storage.New()\n\tif err != nil {\n\t\tc.JSON(500, gin.H{\n\t\t\t\"error\": \"error opening database\",\n\t\t})\n\t\treturn\n\t}\n\tdefer st.Close()\n\n\tvar return_key string\n\n\tfor _, search_key := range search {\n\t\ttrans_key, err := TranslateKey(search_key, &c.Params)\n\n\t\t// TODO - be more specific about what errors are ok here\n\t\tif err != nil || trans_key == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\treturn_key = trans_key\n\n\t\terr = st.Delete(trans_key)\n\t\tif err != nil {\n\t\t\tc.JSON(500, gin.H{\n\t\t\t\t\"error\": err,\n\t\t\t})\n\t\t\treturn\n\t\t}\n\t}\n\n\tif return_key != \"\" {\n\t\tc.JSON(200, gin.H{\n\t\t\t\"key\": return_key,\n\t\t})\n\t\treturn\n\t} else {\n\t\tc.JSON(404, gin.H{\n\t\t\t\"error\": \"Not Found\",\n\t\t})\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "dea633a9bd4b89bcb06abe1db43c0c2d", "score": "0.5228526", "text": "func DeactivateKey(settings *playfab.Settings, postData *DeactivateAPIKeyRequestModel, entityToken string) (*DeactivateAPIKeyResponseModel, error) {\n if entityToken == \"\" {\n return nil, playfab.NewCustomError(\"entityToken should not be an empty string\", playfab.ErrorGeneric)\n }\n b, errMarshal := json.Marshal(postData)\n if errMarshal != nil {\n return nil, playfab.NewCustomError(errMarshal.Error(), playfab.ErrorMarshal)\n }\n\n sourceMap, err := playfab.Request(settings, b, \"/APIKey/DeactivateKey\", \"X-EntityToken\", entityToken)\n if err != nil {\n return nil, err\n }\n \n result := &DeactivateAPIKeyResponseModel{}\n\n config := mapstructure.DecoderConfig{\n DecodeHook: playfab.StringToDateTimeHook,\n Result: result,\n }\n \n decoder, errDecoding := mapstructure.NewDecoder(&config)\n if errDecoding != nil {\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\n }\n \n errDecoding = decoder.Decode(sourceMap)\n if errDecoding != nil {\n return nil, playfab.NewCustomError(errDecoding.Error(), playfab.ErrorDecoding)\n }\n\n return result, nil\n}", "title": "" }, { "docid": "9a3a8ef637aa321707dd29bdd7aa5035", "score": "0.5227104", "text": "func (am *AccountManager) RevokeSetupKey(accountId string, keyId string) (*SetupKey, error) {\n\tam.mux.Lock()\n\tdefer am.mux.Unlock()\n\n\taccount, err := am.Store.GetAccount(accountId)\n\tif err != nil {\n\t\treturn nil, status.Errorf(codes.NotFound, \"account not found\")\n\t}\n\n\tsetupKey := getAccountSetupKeyById(account, keyId)\n\tif setupKey == nil {\n\t\treturn nil, status.Errorf(codes.NotFound, \"unknown setupKey %s\", keyId)\n\t}\n\n\tkeyCopy := setupKey.Copy()\n\tkeyCopy.Revoked = true\n\taccount.SetupKeys[keyCopy.Key] = keyCopy\n\terr = am.Store.SaveAccount(account)\n\tif err != nil {\n\t\treturn nil, status.Errorf(codes.Internal, \"failed adding account key\")\n\t}\n\n\treturn keyCopy, nil\n}", "title": "" }, { "docid": "f1e78f428709334dee5a8efe86d12ae7", "score": "0.52135384", "text": "func (o *OpsgenieServiceCreateAttributes) SetOpsgenieApiKey(v string) {\n\to.OpsgenieApiKey = v\n}", "title": "" }, { "docid": "0468c94cec5ade8aab99b5c6706167fb", "score": "0.521127", "text": "func (mf *KeystoreFsm) DeleteKey(id string) {\n\tmf.ksMutex.Lock()\n\tdefer mf.ksMutex.Unlock()\n\tdelete((*mf.keystore), id)\n\treturn\n}", "title": "" }, { "docid": "efebf6963639ca95e887f0532a958307", "score": "0.51989746", "text": "func (o *AuthResWeb) GetApiKey() ApiKey {\n\tif o == nil || o.ApiKey == nil {\n\t\tvar ret ApiKey\n\t\treturn ret\n\t}\n\treturn *o.ApiKey\n}", "title": "" }, { "docid": "981ddfc1fa8da8400ad0fa1f51fa9898", "score": "0.5197819", "text": "func (a *APIAccess) DeleteAPIAccessKey(keys APIAccessDeleteInput) ([]APIAccessDeletedKey, error) {\n\treturn a.DeleteAPIAccessKeyWithContext(context.Background(), keys)\n}", "title": "" }, { "docid": "93134ab16fc7825b09e517072cb93f21", "score": "0.5190246", "text": "func (facade *OutlineVpnFacade) DeleteKey(key *core.VpnKey) error {\n\terr := facade.api.DeleteKey(key)\n\tif err != nil {\n\t\tfacade.l.Error(err)\n\t\treturn err\n\t}\n\n\treturn facade.outlineStorage.DeleteKey(key, facade.host)\n}", "title": "" }, { "docid": "07c966826a21ef176b29966ff60e0052", "score": "0.5166167", "text": "func (o *ApiKeyListResponse) GetApiKeys() []ApiKey {\n\tif o == nil || o.ApiKeys == nil {\n\t\tvar ret []ApiKey\n\t\treturn ret\n\t}\n\treturn *o.ApiKeys\n}", "title": "" }, { "docid": "833a9f620635bbf0e9a915ad082c8b64", "score": "0.5162106", "text": "func (pm *PolicyMap) DeleteKey(k PolicyKey) error {\n\treturn pm.Delete(k.Identity, k.DestPort, u8proto.U8proto(k.Nexthdr), TrafficDirection(k.TrafficDirection))\n}", "title": "" }, { "docid": "7798828dc15122bd0b6d274055a7613e", "score": "0.51589036", "text": "func (s *Store) DeleteKey(source string, key string) error {\n\tif !s.IsLeader() {\n\t\treturn errors.New(\"DeleteKey should only be called on the leader\")\n\t}\n\n\tc := &command{Operation: operationDeleteKey, Source: source, Key: key}\n\tb, err := json.Marshal(c)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn s.raft.Apply(b, raftTimeout).Error()\n}", "title": "" }, { "docid": "c51982aebe0649d94eaa8b50938841de", "score": "0.51457363", "text": "func (c Client) deleteAccessKeys(user string) error {\n\tin := iam.ListAccessKeysInput{UserName: aws.String(user)}\n\tr := c.ListAccessKeysRequest(&in)\n\tp := r.Paginate()\n\tvar ids []string\n\tfor p.Next() {\n\t\tout := p.CurrentPage().AccessKeyMetadata\n\t\tfor i := range out {\n\t\t\tids = append(ids, aws.StringValue(out[i].AccessKeyId))\n\t\t}\n\t}\n\tif err := p.Err(); err != nil {\n\t\treturn err\n\t}\n\treturn fast.ForEachIO(len(ids), func(i int) error {\n\t\tin := iam.DeleteAccessKeyInput{\n\t\t\tAccessKeyId: aws.String(ids[i]),\n\t\t\tUserName: aws.String(user),\n\t\t}\n\t\t_, err := c.DeleteAccessKeyRequest(&in).Send()\n\t\treturn err\n\t})\n}", "title": "" }, { "docid": "5ecef8cecace31cf164b8202b81908ab", "score": "0.513673", "text": "func (c *MockClient) Delete(_ context.Context, key string, options ...RequestOption) error {\n\tif _, exists := c.SecretValues[key]; !exists {\n\t\treturn fmt.Errorf(\"Key not found: %s\", key)\n\t}\n\n\tdelete(c.SecretValues, key)\n\treturn nil\n}", "title": "" }, { "docid": "36beafe957912787d30c0efb8d58c63e", "score": "0.5135025", "text": "func (c *client) Del(key string) error {\n\t_, err := c.do(\"DEL\", key)\n\n\treturn err\n}", "title": "" }, { "docid": "980d9bb8f2f454bed1d26ae035c1a21c", "score": "0.51326686", "text": "func TestDeleteUser(t *testing.T) {\n\tclient := resty.New()\n\tresp, err := client.R().\n\t\tDelete(ROOT_URL + \"api/user/1\")\n\tassert.NoError(t, err)\n\tassert.Equal(t, 200, resp.StatusCode())\n}", "title": "" }, { "docid": "8177357e78e1754b4865341a94225b00", "score": "0.51306576", "text": "func (t *RPCExt) RemoveKey(args *util.RPCExtArgs, reply *int) error {\n\tprocessExtCall(args.Key, args.Value, util.RK)\n\treturn nil\n}", "title": "" }, { "docid": "add1b6d18d70c4ea87e3a72754a9ff28", "score": "0.5122754", "text": "func DeleteSSHKey(ctx *context.Context) {\n\tif err := models.DeletePublicKey(ctx.User, ctx.QueryInt64(\"id\")); err != nil {\n\t\tctx.Flash.Error(\"DeletePublicKey: \" + err.Error())\n\t} else {\n\t\tctx.Flash.Success(ctx.Tr(\"settings.ssh_key_deletion_success\"))\n\t}\n\n\tctx.JSON(200, map[string]interface{}{\n\t\t\"redirect\": setting.AppSubURL + \"/user/settings/ssh\",\n\t})\n}", "title": "" }, { "docid": "dad84eea2e9cbce5226f3df5ccd722ab", "score": "0.51076955", "text": "func ValidateAPIKey(apiKey string) (bool, uint8) {\n\n\ttx, err := Database.Begin()\n\tif errorOccurred(err, false) {\n\t\treturn false, 0\n\t}\n\n\tstmt, err := tx.Prepare(`select users.admin from keys left join users on users.id = keys.owner where keys.authkey = $1 and keys.expiresafter >= now()`)\n\tif errorOccurred(err, false) {\n\t\treturn false, 0\n\t}\n\tdefer stmt.Close()\n\n\tvar isAdmin bool\n\terr = stmt.QueryRow(apiKey).Scan(&isAdmin)\n\tif errorOccurred(err, false) {\n\t\treturn false, 0\n\t}\n\n\tpermLevel := uint8(1)\n\tif isAdmin {\n\t\tpermLevel++\n\t}\n\n\treturn true, permLevel\n\n}", "title": "" }, { "docid": "65c32b8092ec3a9e4434d73ea304e889", "score": "0.51042503", "text": "func (s *RegistryServer) DeleteApi(ctx context.Context, req *rpc.DeleteApiRequest) (*empty.Empty, error) {\n\tclient, err := s.getStorageClient(ctx)\n\tif err != nil {\n\t\treturn nil, status.Error(codes.Unavailable, err.Error())\n\t}\n\tdefer s.releaseStorageClient(client)\n\tdb := dao.NewDAO(client)\n\n\tname, err := names.ParseApi(req.GetName())\n\tif err != nil {\n\t\treturn nil, status.Error(codes.InvalidArgument, err.Error())\n\t}\n\n\t// Deletion should only succeed on APIs that currently exist.\n\tif _, err := db.GetApi(ctx, name); err != nil {\n\t\treturn nil, err\n\t}\n\n\tif err := db.DeleteApi(ctx, name); err != nil {\n\t\treturn nil, err\n\t}\n\n\ts.notify(ctx, rpc.Notification_DELETED, name.String())\n\treturn &empty.Empty{}, nil\n}", "title": "" }, { "docid": "b45c7e67df76125d639957bda8ab5616", "score": "0.5102998", "text": "func (o *OpsGenieNotificationConfigAllOf) GetApiKey() string {\n\tif o == nil || o.ApiKey == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\treturn *o.ApiKey\n}", "title": "" }, { "docid": "62c7e5f3631d85c1cdac01e612a1c0a2", "score": "0.5096111", "text": "func (a *APIKeysApiService) GetApiKeyExecute(r ApiGetApiKeyRequest) (*GetApiKeyResponse, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *GetApiKeyResponse\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"APIKeysApiService.GetApiKey\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/orgs/self/users/{user}/apikeys/{name}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"user\"+\"}\", url.PathEscape(parameterValueToString(r.user, \"user\")), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"name\"+\"}\", url.PathEscape(parameterValueToString(r.name, \"name\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\tif r.reveal != nil {\n\t\tparameterAddToHeaderOrQuery(localVarQueryParams, \"reveal\", r.reveal, \"\")\n\t}\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := io.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = io.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 405 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 406 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 408 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 409 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 415 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 429 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 501 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 502 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 503 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "98b867fe1c7ac1fab9aa78c44008db9f", "score": "0.5091938", "text": "func (a *APIKeysApiService) UpdateApiKeyExecute(r ApiUpdateApiKeyRequest) (*UpdateApiKeyResponse, *http.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = http.MethodPost\n\t\tlocalVarPostBody interface{}\n\t\tformFiles []formFile\n\t\tlocalVarReturnValue *UpdateApiKeyResponse\n\t)\n\n\tlocalBasePath, err := a.client.cfg.ServerURLWithContext(r.ctx, \"APIKeysApiService.UpdateApiKey\")\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, &GenericOpenAPIError{error: err.Error()}\n\t}\n\n\tlocalVarPath := localBasePath + \"/v1/orgs/self/users/{user}/apikeys/{name}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"name\"+\"}\", url.PathEscape(parameterValueToString(r.name, \"name\")), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"user\"+\"}\", url.PathEscape(parameterValueToString(r.user, \"user\")), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\tif r.body == nil {\n\t\treturn localVarReturnValue, nil, reportError(\"body is required and must be specified\")\n\t}\n\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{\"application/json\"}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\t// body params\n\tlocalVarPostBody = r.body\n\treq, err := a.client.prepareRequest(r.ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, formFiles)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(req)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := io.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = io.NopCloser(bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 401 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 403 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 404 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 405 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 406 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 408 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 409 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 415 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 429 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 500 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 501 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 502 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 503 {\n\t\t\tvar v ErrorModel\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\t\t\tnewErr.error = formatErrorMessage(localVarHTTPResponse.Status, &v)\n\t\t\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := &GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "32233a98748315c5638d1ec940a1c1a1", "score": "0.50874776", "text": "func (a *DefaultApiService) DeleteApiTokenById(ctx context.Context, adminId int32, apitokenId int32) (ApiTokenResponse, *http.Response, error) {\n\tvar (\n\t\tlocalVarHttpMethod = strings.ToUpper(\"Delete\")\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue ApiTokenResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/setting/admins/{adminId}/apitokens/{apitokenId}\"\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"adminId\"+\"}\", fmt.Sprintf(\"%v\", adminId), -1)\n\tlocalVarPath = strings.Replace(localVarPath, \"{\"+\"apitokenId\"+\"}\", fmt.Sprintf(\"%v\", apitokenId), -1)\n\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := url.Values{}\n\tlocalVarFormParams := url.Values{}\n\n\t// to determine the Content-Type header\n\tlocalVarHttpContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHttpContentType := selectHeaderContentType(localVarHttpContentTypes)\n\tif localVarHttpContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHttpContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHttpHeaderAccepts := []string{\"application/json\"}\n\n\t// set Accept header\n\tlocalVarHttpHeaderAccept := selectHeaderAccept(localVarHttpHeaderAccepts)\n\tif localVarHttpHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHttpHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHttpMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHttpResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHttpResponse == nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tlocalVarBody, err := ioutil.ReadAll(localVarHttpResponse.Body)\n\tlocalVarHttpResponse.Body.Close()\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t}\n\n\tif localVarHttpResponse.StatusCode < 300 {\n\t\t// If we succeed, return the data, otherwise pass on to decode error.\n\t\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\tif err == nil {\n\t\t\treturn localVarReturnValue, localVarHttpResponse, err\n\t\t}\n\t}\n\n\tif localVarHttpResponse.StatusCode >= 300 {\n\t\tnewErr := GenericSwaggerError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHttpResponse.Status,\n\t\t}\n\t\t\n\t\tif localVarHttpResponse.StatusCode == 200 {\n\t\t\tvar v ApiTokenResponse\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHttpResponse.Header.Get(\"Content-Type\"));\n\t\t\t\tif err != nil {\n\t\t\t\t\tnewErr.error = err.Error()\n\t\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t\t\t}\n\t\t\t\tnewErr.model = v\n\t\t\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t\t}\n\t\t\n\t\treturn localVarReturnValue, localVarHttpResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHttpResponse, nil\n}", "title": "" }, { "docid": "729b9b52e55ec4656803040ad0ffd055", "score": "0.5083367", "text": "func (s *Redis) DeleteKey(key string) error {\n\tconn := s.pool.Get()\n\tdefer conn.Close()\n\n\treply, err := redis.Int(conn.Do(\"DEL\", key))\n\tif err != nil {\n\t\treturn err\n\t}\n\tif 0 == reply {\n\t\treturn ErrNoKey\n\t}\n\treturn nil\n}", "title": "" } ]
5e64a718b6a1e80403e53a5a83093f66
HasColumnKeys returns true if any values use a column key.
[ { "docid": "fc16b1320c388d9d6420254760d9e4e4", "score": "0.86220956", "text": "func (p Bits) HasColumnKeys() bool {\n\tfor i := range p {\n\t\tif p[i].ColumnKey != \"\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" } ]
[ { "docid": "4fc0cffaa0a1feb1d7c0c0bde4cac687", "score": "0.8744028", "text": "func (p FieldValues) HasColumnKeys() bool {\n\tfor i := range p {\n\t\tif p[i].ColumnKey != \"\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "4fc0cffaa0a1feb1d7c0c0bde4cac687", "score": "0.8744028", "text": "func (p FieldValues) HasColumnKeys() bool {\n\tfor i := range p {\n\t\tif p[i].ColumnKey != \"\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "d715c8dee8b4147a79b8dbf261e9764e", "score": "0.6959736", "text": "func (o *TaskResponseIncluded) HasColumns() bool {\n\tif o != nil && o.Columns != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "4125b99b92fbbc7986ff5ddbe895be64", "score": "0.6812157", "text": "func (p Bits) HasRowKeys() bool {\n\tfor i := range p {\n\t\tif p[i].RowKey != \"\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "4125b99b92fbbc7986ff5ddbe895be64", "score": "0.6812157", "text": "func (p Bits) HasRowKeys() bool {\n\tfor i := range p {\n\t\tif p[i].RowKey != \"\" {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "670c117e8f477012c7faec95a1dc8388", "score": "0.67786384", "text": "func (d *Dataset) HasCol(key string) bool {\n\t_, ok := d.getColumnIndex(key)\n\treturn ok\n}", "title": "" }, { "docid": "9903d00eaac36b93a1142ff81aa15cf5", "score": "0.66420555", "text": "func hasColumn(tableMap map[string][]string, tableName string, columnName string) bool {\n\tif columns, ok := tableMap[tableName]; ok {\n\t\tfor _, value := range columns {\n\t\t\tif value == columnName {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "64c6b49261843e4721e13a9031c533a4", "score": "0.66406155", "text": "func (o *MicrosoftGraphList) HasColumns() bool {\n\tif o != nil && o.Columns != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f8f54937fe20d491d0feea9a07765ed7", "score": "0.6556646", "text": "func (df *DataFrame) HasCols(colNames ...string) error {\n\tfor _, name := range colNames {\n\t\t_, err := indexOfContainer(name, df.values)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"verifying columns: %v\", err)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3a22981ada4659f9ab04af8e806df739", "score": "0.64875764", "text": "func HasKey(column string, opts ...Option) *sql.Predicate {\n\treturn sql.P(func(b *sql.Builder) {\n\t\tValuePath(b, column, opts...)\n\t\tb.WriteOp(sql.OpNotNull)\n\t})\n}", "title": "" }, { "docid": "0ff60f132dd0b5b390b08538e68e088c", "score": "0.6414572", "text": "func (p FieldValues) ColumnKeys() []string {\n\tif !p.HasColumnKeys() {\n\t\treturn nil\n\t}\n\tother := make([]string, len(p))\n\tfor i := range p {\n\t\tother[i] = p[i].ColumnKey\n\t}\n\treturn other\n}", "title": "" }, { "docid": "0ff60f132dd0b5b390b08538e68e088c", "score": "0.6414572", "text": "func (p FieldValues) ColumnKeys() []string {\n\tif !p.HasColumnKeys() {\n\t\treturn nil\n\t}\n\tother := make([]string, len(p))\n\tfor i := range p {\n\t\tother[i] = p[i].ColumnKey\n\t}\n\treturn other\n}", "title": "" }, { "docid": "43d7da835681edf1aea1cfa351efde71", "score": "0.63455045", "text": "func (o *InlineObject44) HasColumnId() bool {\n\tif o != nil && o.ColumnId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "96d65ba34a9f77388def5575c30c7ccd", "score": "0.63243896", "text": "func (p Bits) ColumnKeys() []string {\n\tif !p.HasColumnKeys() {\n\t\treturn nil\n\t}\n\tother := make([]string, len(p))\n\tfor i := range p {\n\t\tother[i] = p[i].ColumnKey\n\t}\n\treturn other\n}", "title": "" }, { "docid": "96d65ba34a9f77388def5575c30c7ccd", "score": "0.63243896", "text": "func (p Bits) ColumnKeys() []string {\n\tif !p.HasColumnKeys() {\n\t\treturn nil\n\t}\n\tother := make([]string, len(p))\n\tfor i := range p {\n\t\tother[i] = p[i].ColumnKey\n\t}\n\treturn other\n}", "title": "" }, { "docid": "00d33be7539bee7f4cebd971fcec7d07", "score": "0.61657166", "text": "func (q *QL) HasColumn(tableName string, columnName string) bool {\n\tquerry := \"select count() from __Column where Name=$1 && TableName=$2\"\n\tvar count int\n\terr := q.db.QueryRow(querry, columnName, tableName).Scan(&count)\n\tif err != nil {\n\t\t//TODO; Propery log or return this error?\n\t}\n\treturn count > 0\n}", "title": "" }, { "docid": "ec1df2ff49e5516dfdd834963fa3c7df", "score": "0.613372", "text": "func HasColumn(cols []tab.Column, col tab.Column) (*tab.Column, bool) {\n\tfor i, c := range cols {\n\t\tif c.Name() == col.Name() {\n\t\t\treturn &cols[i], true\n\t\t}\n\t}\n\treturn nil, false\n}", "title": "" }, { "docid": "d734885a141fd54b0124d8d7a5b96ec9", "score": "0.61287796", "text": "func (o *MicrosoftGraphLookupColumn) HasColumnName() bool {\n\tif o != nil && o.ColumnName != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "f385df984776b93984ff3a4a3c162081", "score": "0.60933876", "text": "func (set ColumnSet) Has(name string) bool {\n\treturn set.Get(name).IsValid()\n}", "title": "" }, { "docid": "75c4a01201af4d88a746454d774899f0", "score": "0.60931677", "text": "func (o *InlineObject45) HasColumn() bool {\n\tif o != nil && o.Column != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "d621a5fb0e8581c162867dcabfefd772", "score": "0.6082215", "text": "func HasColumn(e *engine.Engine, modelValue interface{}, column string) bool {\n\tms, err := GetModelStruct(e, modelValue)\n\tif err != nil {\n\t\t//TODO log this?\n\t\treturn false\n\t}\n\tfor _, field := range ms.StructFields {\n\t\tif field.IsNormal && (field.Name == column || field.DBName == column) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e458673ce6138f2dab37eac7ec4baea3", "score": "0.6071844", "text": "func (schema Schema) HasColumn(column string) bool {\n\tif schema.pk.ColumnName() == column || schema.pk.ColumnPath() == column {\n\t\treturn true\n\t}\n\n\t_, ok := schema.fields[column]\n\tif ok {\n\t\treturn true\n\t}\n\n\tcolumn = strings.TrimPrefix(column, fmt.Sprint(schema.TableName(), \".\"))\n\t_, ok = schema.fields[column]\n\n\treturn ok\n}", "title": "" }, { "docid": "b8ac4dc98d5955908243be1b13e31b53", "score": "0.5891525", "text": "func (c *Connection) HasKeys(buckets []string, keys []string) (doesHaveKeyMap map[string]bool, err error) {\n\ttype QueryJSON struct {\n\t\tBuckets []string `json:\"buckets\"`\n\t\tKeys []string `json:\"keys\"`\n\t}\n\tpayloadJSON := new(QueryJSON)\n\tpayloadJSON.Buckets = buckets\n\tpayloadJSON.Keys = keys\n\n\tpayloadBytes, err := json.Marshal(payloadJSON)\n\tif err != nil {\n\t\treturn doesHaveKeyMap, err\n\t}\n\tbody := bytes.NewReader(payloadBytes)\n\n\treq, err := http.NewRequest(\"GET\", fmt.Sprintf(\"%s/v1/db/%s/haskeys\", c.Address, c.DBName), body)\n\tif err != nil {\n\t\treturn doesHaveKeyMap, err\n\t}\n\treq.Header.Set(\"Content-Type\", \"application/json\")\n\n\tresp, err := http.DefaultClient.Do(req)\n\tif err != nil {\n\t\treturn doesHaveKeyMap, err\n\t}\n\tdefer resp.Body.Close()\n\n\terr = json.NewDecoder(resp.Body).Decode(&doesHaveKeyMap)\n\treturn doesHaveKeyMap, err\n}", "title": "" }, { "docid": "887096518094c3cad423d7a70f11de68", "score": "0.5887292", "text": "func (t *Table) HasAutoIncrement() bool {\n\tfor _, c := range t.Columns {\n\t\tif c.AutoIncrement {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "2b5688cae45bc7acde1566fd591eb849", "score": "0.58835596", "text": "func (f Filters) HaveKeys(keys ...string) bool {\n\tif len(keys) == 0 {\n\t\treturn false\n\t}\n\n\tfor _, key := range keys {\n\t\tfilter, ok := f[key]\n\t\tif !ok || len(filter) == 0 {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "60a3332924229624a85e6c22c007b7a4", "score": "0.58463365", "text": "func (set ColumnSet) Exists() bool {\n\treturn len(set.order) > 0\n}", "title": "" }, { "docid": "5e6a431777842fa7f53eb492afa26689", "score": "0.5824162", "text": "func (f fields) Has(column string) bool {\n\tfor _, field := range f {\n\t\t// TODO what to do with table name?\n\t\tif field.column == column {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "fd4ebaef43a5a8eb3b6575192eb3f3e6", "score": "0.57497", "text": "func (me TxsdTableRules) IsCols() bool { return me == \"cols\" }", "title": "" }, { "docid": "ab542e9351b10831f73176efcc24ffac", "score": "0.5732121", "text": "func (s TableColSet) Contains(col descpb.ColumnID) bool { return s.set.Contains(int(col)) }", "title": "" }, { "docid": "ae4bc681dbd695a387ccdfce1932d759", "score": "0.57096183", "text": "func hasAnyKeys(m map[string]string, keys []string) bool {\n\tfor _, k := range keys {\n\t\tif _, ok := m[k]; ok {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "b440b50714e5dadb93c46327d7600a70", "score": "0.5694508", "text": "func (t *Table) NonNullableAndNonGeneratedColumnsExist(columns []string) (bool, []string) {\n\tusedColumns := make(map[string]struct{}, len(columns))\n\tfor _, name := range columns {\n\t\tusedColumns[name] = struct{}{}\n\t}\n\n\tvar noExistNonNullableColumns []string\n\tfor _, c := range t.columns {\n\t\tif c.nullable {\n\t\t\tcontinue\n\t\t}\n\t\tif c.ast != nil && c.ast.GeneratedExpr != nil {\n\t\t\tcontinue\n\t\t}\n\n\t\tn := c.Name()\n\t\tif _, ok := usedColumns[n]; !ok {\n\t\t\tnoExistNonNullableColumns = append(noExistNonNullableColumns, n)\n\t\t}\n\t}\n\n\tif len(noExistNonNullableColumns) > 0 {\n\t\treturn true, noExistNonNullableColumns\n\t}\n\n\treturn false, nil\n}", "title": "" }, { "docid": "6cac3c1aee4b8df0b18a6a13c25075a1", "score": "0.5694234", "text": "func (pf *PostgresFlavor) ExistsColumn(tn string, cn string) bool {\n\n\tn := 0\n\tpf.QsLog(\"SELECT count(*) FROM INFORMATION_SCHEMA.columns WHERE table_name = ? AND column_name = ? AND table_schema = CURRENT_SCHEMA()\", tn, cn)\n\trow := pf.db.QueryRow(\"SELECT count(*) FROM INFORMATION_SCHEMA.columns WHERE table_name = $1 AND column_name = $2 AND table_schema = CURRENT_SCHEMA()\", tn, cn)\n\tif row != nil {\n\t\trow.Scan(&n)\n\t\tif n > 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "359c6920d9839fc1c310c37d92a4f557", "score": "0.5658465", "text": "func Columns(names ...string) ColumnHeader {\n result := make(map[string]bool)\n for _, col := range names {\n result[col] = true\n }\n return ColumnHeader{result}\n}", "title": "" }, { "docid": "c30fbd1f8f55e0fbec30c63f41616e98", "score": "0.5626474", "text": "func _1520hasColumn(tls crt.TLS, _aiCol uintptr /* *Ti16 = int16 */, _nCol int32, _x int32) (r int32) {\n_1:\n\tif postinc24(&_nCol) <= int32(0) {\n\t\tgoto _2\n\t}\n\n\tif _x != int32(*(*int16)(unsafe.Pointer(postinc213(&_aiCol)))) {\n\t\tgoto _3\n\t}\n\n\treturn int32(1)\n\n_3:\n\tgoto _1\n\n_2:\n\treturn int32(0)\n}", "title": "" }, { "docid": "8f7f650487cfcb401ccc8c0d6d278632", "score": "0.5613117", "text": "func (m mappers) isColumnMapped(columnName string) (columnIsMapped bool, customParameterName string) {\n\tfor _, x := range m {\n\t\tif x.col == columnName {\n\t\t\treturn true, x.param\n\t\t}\n\t}\n\treturn false, \"\"\n}", "title": "" }, { "docid": "1e0f8a34f9f051eb0b06d03eb5f099cd", "score": "0.56094325", "text": "func (m *Model) checkKeys() (bool, error) {\n\tcheck := map[string]byte{\n\t\t\"hash\": 0,\n\t\t\"range\": 0,\n\t}\n\n\thashKey := m.KeySchema[\"HASH\"]\n\trangeKey := m.KeySchema[\"RANGE\"]\n\n\tfor _, a := range m.Attributes {\n\t\tif a.Name == hashKey {\n\t\t\tcheck[\"hash\"]++\n\t\t}\n\t\tif a.Name == rangeKey {\n\t\t\tcheck[\"range\"]++\n\t\t}\n\t}\n\n\tif check[\"hash\"] == 0 {\n\t\treturn false, fmt.Errorf(\"No Hash Key defined for %s. Cannot identify ID Attribute\", m.Name)\n\t}\n\n\tif check[\"hash\"] == 1 {\n\t\tif check[\"range\"] >= 1 {\n\t\t\tm.CompositeKey = true\n\t\t}\n\n\t\treturn true, nil\n\t}\n\n\treturn false, fmt.Errorf(\"Too many keys defined in Key Schema\")\n\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57ab0d91fb4e01aafc8ecbddd2bffed2", "score": "0.5595497", "text": "func ValidColumn(column string) bool {\n\tfor i := range Columns {\n\t\tif column == Columns[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor i := range ForeignKeys {\n\t\tif column == ForeignKeys[i] {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "13580ae65cb0472fbf176fbd1aa9c46d", "score": "0.55549836", "text": "func ColumnInColumnlist(columnName string, columnList []RequiredColumn) (bool, int) {\n\n\tfor i, column := range columnList {\n\t\tif columnName == column.PropertyName {\n\t\t\treturn true, i\n\t\t}\n\t}\n\n\treturn false, -1\n}", "title": "" }, { "docid": "debccf50ee44861e52c4bdedc5122710", "score": "0.5528912", "text": "func (md MetaData) IsDefined(key ...string) bool {\n\tvar hashOrVal interface{}\n\tvar hash map[string]interface{}\n\tvar ok bool\n\n\tif len(key) == 0 {\n\t\treturn false\n\t}\n\n\thashOrVal = md.mapping\n\tfor _, k := range key {\n\t\tif hash, ok = hashOrVal.(map[string]interface{}); !ok {\n\t\t\treturn false\n\t\t}\n\t\tif hashOrVal, ok = hash[k]; !ok {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "ff2b6c2d8a8e8ed8ec1c6a8ea5c2c5cc", "score": "0.552839", "text": "func HasAutoIncrementColumn(tbInfo *model.TableInfo) (bool, string) {\n\tfor _, col := range tbInfo.Columns {\n\t\tif mysql.HasAutoIncrementFlag(col.GetFlag()) {\n\t\t\treturn true, col.Name.L\n\t\t}\n\t}\n\treturn false, \"\"\n}", "title": "" }, { "docid": "4e42671684df58bd1109a41a85b2d36f", "score": "0.55064666", "text": "func hasAllKeys(m map[string]string, keys []string) bool {\n\tfor _, k := range keys {\n\t\tif _, ok := m[k]; !ok {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "12b0e1e98515c106cdfa083cdf315835", "score": "0.5466362", "text": "func (o *TaskResponseIncluded) GetColumnsOk() (*map[string]ViewBoardColumn, bool) {\n\tif o == nil || o.Columns == nil {\n\t\treturn nil, false\n\t}\n\treturn o.Columns, true\n}", "title": "" }, { "docid": "b3c8bf2477837528ae1701760caef15e", "score": "0.54154044", "text": "func (a table) Has(ctx HasKVStore, key RowID) bool {\n\tif len(key) == 0 {\n\t\treturn false\n\t}\n\tstore := prefix.NewStore(ctx.KVStore(a.storeKey), []byte{a.prefix})\n\tit := store.Iterator(PrefixRange(key))\n\tdefer it.Close()\n\treturn it.Valid()\n}", "title": "" }, { "docid": "1843b5c0669e44a4b44c0aed69fad3a0", "score": "0.540666", "text": "func hasPrintColumn(comments []string) bool {\n\tfor _, c := range comments {\n\t\tif strings.Contains(c, \"+printcolumn\") || strings.Contains(c, \"+kubebuilder:printcolumn\") {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "0e2d23176549fd0f5f085710ea44d6f0", "score": "0.539396", "text": "func (v *SettingsSchema) HasKey(v1 string) bool {\n\tcstr := (*C.gchar)(C.CString(v1))\n\tdefer C.free(unsafe.Pointer(cstr))\n\n\treturn gobool(C.g_settings_schema_has_key(v.native(), cstr))\n}", "title": "" }, { "docid": "3287013b8165dbd31a6f34cad4b3510f", "score": "0.53905445", "text": "func (d *Dataset) HasHeaders() bool {\n\treturn d.headers.Len() > 0\n}", "title": "" }, { "docid": "a3206387a7fc4602b640abccf3115288", "score": "0.53792113", "text": "func (schema SettingsSchema) HasKey(name string) bool {\n\tname0 := (*C.gchar)(C.CString(name))\n\tret0 := C.g_settings_schema_has_key(schema.native(), name0)\n\tC.free(unsafe.Pointer(name0)) /*ch:<stdlib.h>*/\n\treturn util.Int2Bool(int(ret0)) /*go:.util*/\n}", "title": "" }, { "docid": "b9b56ef3e4a662b3d195acd53199227c", "score": "0.5377509", "text": "func CheckColumnNames(file string, e *log.Logger, keys []string, path string, j int) {\n\t// read from the columns file\n\tcolumns, err := ReadLines(file)\n\n\tCheckErr(e, err)\n\tfor _, k := range keys {\n\n\t\tif !StringInSlice(1, k, columns) {\n\t\t\te.Println(path, \"Sheet #:\", j+1, \"INFO: Unexpected Column:\", k)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "615b1044c07e68247cab3b32f4e2db51", "score": "0.5367448", "text": "func (data *InternalTimeSeriesData) IsColumnar() bool {\n\treturn len(data.Offset) > 0\n}", "title": "" }, { "docid": "7978731dbb87a1e1fbbe107860cc876e", "score": "0.536375", "text": "func (f Index) Has(keyFields Item) (bool, error) {\n\tkey, err := f.encodeKeyFunc(keyFields)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"encode key: %w\", err)\n\t}\n\treturn f.db.Has(key)\n}", "title": "" }, { "docid": "ff61af6407f1b2e074216843bce83d99", "score": "0.53472406", "text": "func (schema Schema) HasCreatedKey() bool {\n\treturn schema.createdKey != nil\n}", "title": "" }, { "docid": "766a3f7522201b8d10964227fad26ffc", "score": "0.53161526", "text": "func (o *MicrosoftGraphLookupColumn) HasAllowMultipleValues() bool {\n\tif o != nil && o.AllowMultipleValues != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "fe3fe44dbabe2d9d84aa13df6cbe78c6", "score": "0.531253", "text": "func (m *Info) HavePk() bool {\n\treturn len(m.PkColumnsSchema()) > 0\n}", "title": "" }, { "docid": "b0821e47284ceaa53cb39c266f879b58", "score": "0.5306355", "text": "func HasValue(col reflect.Value, key string, value interface{}) bool {\n\tfor i := 0; i < col.Len(); i++ {\n\t\tval := col.Index(i)\n\t\tif val.Kind() == reflect.Ptr {\n\t\t\tval = val.Elem()\n\t\t}\n\n\t\tvalx := val.FieldByName(key).Interface()\n\t\tif valx == value {\n\t\t\treturn true\n\t\t}\n\n\t}\n\treturn false\n}", "title": "" }, { "docid": "89cb9a4091b799325d0e0228e9a647a0", "score": "0.5282968", "text": "func (o *MicrosoftGraphLookupColumn) HasPrimaryLookupColumnId() bool {\n\tif o != nil && o.PrimaryLookupColumnId != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "ffa14aaddfd9c8ce9c5b01b410940b85", "score": "0.52746105", "text": "func FetchColumns(conn *pgx.Conn, keys []ColumnKey) ([]Column, error) {\n\tif len(keys) == 0 {\n\t\treturn nil, nil\n\t}\n\n\t// Try cache first.\n\tuncachedKeys := make([]ColumnKey, 0, len(keys))\n\tcolumnsMu.Lock()\n\tfor _, key := range keys {\n\t\tif _, ok := columnsCache[key]; !ok && key.TableOID > 0 {\n\t\t\tuncachedKeys = append(uncachedKeys, key)\n\t\t}\n\t}\n\tcolumnsMu.Unlock()\n\tif len(uncachedKeys) == 0 {\n\t\treturn fetchCachedColumns(keys)\n\t}\n\n\t// Build query predicate.\n\tpredicate := &strings.Builder{}\n\tpredicate.Grow(len(uncachedKeys) * 40)\n\tfor i, key := range uncachedKeys {\n\t\tpredicate.WriteString(\"(cls.oid = \")\n\t\tpredicate.WriteString(strconv.Itoa(int(key.TableOID)))\n\t\tpredicate.WriteString(\" AND attr.attnum = \")\n\t\tpredicate.WriteString(strconv.Itoa(int(key.Number)))\n\t\tpredicate.WriteString(\")\")\n\t\tif i < len(uncachedKeys)-1 {\n\t\t\tpredicate.WriteString(\"\\n OR \")\n\t\t}\n\t}\n\n\t// Execute query.\n\tq := texts.Dedent(`\n\t\tSELECT cls.oid AS table_oid,\n\t\t\t\t\t cls.relname AS table_name,\n\t\t\t\t\t attr.attname AS col_name,\n\t\t\t\t\t attr.attnum AS col_num,\n\t\t\t\t\t attr.attnotnull AS col_null\n\t\tFROM pg_class cls\n\t\t\t\t\t JOIN pg_attribute attr ON (attr.attrelid = cls.oid)\n\t`) + \"\\nWHERE \" + predicate.String()\n\tctx, cancel := context.WithTimeout(context.Background(), 3*time.Second)\n\tdefer cancel()\n\trows, err := conn.Query(ctx, q)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"fetch column metadata: %w\", err)\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tcol := Column{}\n\t\tnotNull := false\n\t\tif err := rows.Scan(&col.TableOID, &col.TableName, &col.Name, &col.Number, &notNull); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"scan fetch column row: %w\", err)\n\t\t}\n\t\tcol.Null = !notNull\n\t\tcolumnsCache[ColumnKey{col.TableOID, col.Number}] = col\n\t}\n\tif err := rows.Err(); err != nil {\n\t\treturn nil, fmt.Errorf(\"close fetch column rows: %w\", err)\n\t}\n\n\treturn fetchCachedColumns(keys)\n}", "title": "" }, { "docid": "54adc03e9c38714e948cde657c05e868", "score": "0.526584", "text": "func (schema Schema) HasDeletedKey() bool {\n\treturn schema.deletedKey != nil\n}", "title": "" }, { "docid": "73b935ad04c28829850abea3ca162e16", "score": "0.52633923", "text": "func (c *CanonicalConfig) HasKeys(keys []string) []string {\n\tvar has []string\n\tfor _, s := range keys {\n\t\thasKey, err := c.asUCfg().Has(s, 0, Options...)\n\t\tif err != nil || hasKey {\n\t\t\thas = append(has, s)\n\t\t}\n\t}\n\treturn has\n}", "title": "" }, { "docid": "db8cb74f72e9e078fc0f788fbfaa73e4", "score": "0.5249992", "text": "func (c *Column) hasDataIndex(idx int) bool {\n\treturn (idx >= 0 && idx < c.Length)\n}", "title": "" }, { "docid": "3afa01e29a2e788d5f7cb06a34de7a49", "score": "0.5245294", "text": "func (c *columnnumber) Contains(idx uint32) bool {\n\treturn c.fill.Contains(idx)\n}", "title": "" } ]
1300c84ff74ef495bb12e2216a79dcd8
read will read key to v
[ { "docid": "cd140a40bb76f1942104c2fcc9221fad", "score": "0.7510938", "text": "func (c *collection) read(key string, v interface{}) error {\n\tif c.Keys[key] == nil {\n\t\treturn errors.New(\"key does not exist: \" + key)\n\t}\n\treturn c.Keys[key].read(v)\n}", "title": "" } ]
[ { "docid": "9e038e0868768b55ecf24eeccea43c3f", "score": "0.7001931", "text": "func (d *Driver) Read(key string, v interface{}) error {\n\n\tif key == \"\" {\n\t\treturn ErrMissingKey\n\t}\n\n\treturn d.readFile(key, v)\n}", "title": "" }, { "docid": "4f253d259b9ec828ef3326dd567644f1", "score": "0.69901675", "text": "func (n *Node) read(key int) string {\n\tmutex.Lock()\n\tres := n.m_data[key]\n\tmutex.Unlock()\n\treturn res\n}", "title": "" }, { "docid": "26b3e7cc7e84aaf771f11d65c3ecc62c", "score": "0.6454916", "text": "func readKey() (string, error) {\n\tso := &stdOut{}\n\terr := runCommand(so, \"bash\", \"-c\", \"read -n1 -s key; \"+\n\t\t\"case \\\"$key\\\" in $'\\\\0a') key='enter' ;; $'\\\\177') key='backspace' ;; $'\\\\e') read -n2 -s key ;; esac; \"+\n\t\t\"echo -n $key\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif len(so.str) == 2 {\n\t\tswitch so.str {\n\t\tcase \"[D\":\n\t\t\treturn \"left-arrow\", nil\n\t\tcase \"[C\":\n\t\t\treturn \"right-arrow\", nil\n\t\t}\n\t}\n\treturn so.str, nil\n}", "title": "" }, { "docid": "93c0e92fad1435373d658467cbe33d17", "score": "0.6270587", "text": "func read(key string, db *leveldb.DB) ([]byte, error) {\n\treturn db.Get([]byte(key), nil)\n}", "title": "" }, { "docid": "ec4c5b792b5928c05c82f0570b849642", "score": "0.6196757", "text": "func (e T) ReadKey(buf []byte) []byte {\n\treturn buf[e.offset : e.offset+e.Key()]\n}", "title": "" }, { "docid": "ae9d7811845d10fd9d728ea55feff168", "score": "0.61733514", "text": "func key_read() Mark {\n\tvar key = key()\n\tswitch key {\n\tcase 1: \n\t\treturn DAH\n\tcase 2: \n\t\treturn DIT\n\tcase 3: \n\t\treturn SPACE\n\tdefault:\n\t\treturn Unknown\n\t}\n}", "title": "" }, { "docid": "fa2c8d319285648d5e2fc411e1a46984", "score": "0.613317", "text": "func (d *Diskv) Read(key string) ([]byte, error) {\n\n\t//val1, ok1 := d.cache[key];\n\n\trc, err := d.ReadStream(key, false)\n\tif err != nil {\n\t\treturn []byte{}, err\n\t}\n\n\tdefer rc.Close()\n\tret, reterr := ioutil.ReadAll(rc)\n\n\t//val, ok := d.cache[key];\n\t//fmt.Printf(\"Read after ReadAll [%s/%s] - key found? val: %v ok: %s\\n\", key, d.BasePath, val, ok)\n\n\treturn ret, reterr\n}", "title": "" }, { "docid": "f8bf062de4a14ee0af49e3f769d15c25", "score": "0.6052499", "text": "func readKey(hkdf io.Reader, length int) ([]byte, error) {\n\tkey := make([]byte, length)\n\tn, err := io.ReadFull(hkdf, key)\n\tif n != len(key) {\n\t\treturn key, errors.New(\"Read length doesn't match key length\")\n\t}\n\tif err != nil {\n\t\treturn key, err\n\t}\n\n\treturn key, nil\n}", "title": "" }, { "docid": "e86695a0072e123968fe613b7723c06b", "score": "0.60432523", "text": "func (vk *VaultKeys) Read(s store.Store, c cipher.Cipher) error {\n\tdata, err := ioutil.ReadAll(s)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tkeys := data\n\tif c != nil {\n\t\tkeys, err = c.Decrypt(data)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tv := new(VaultKeys)\n\tif err := json.Unmarshal(keys, v); err != nil {\n\t\treturn err\n\t}\n\tvk.RootToken = v.RootToken\n\tvk.MasterKeys = v.MasterKeys\n\n\treturn nil\n}", "title": "" }, { "docid": "72712e841c8a6ad8e04b793b69786492", "score": "0.5960907", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "72712e841c8a6ad8e04b793b69786492", "score": "0.5960907", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "72712e841c8a6ad8e04b793b69786492", "score": "0.5960907", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "72712e841c8a6ad8e04b793b69786492", "score": "0.5960907", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "72712e841c8a6ad8e04b793b69786492", "score": "0.5960907", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "a9837591db314527f3177b1a47f07138", "score": "0.59400904", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n var key, jsonResp string\n var err error\n\n if len(args) != 1 {\n return nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n }\n\n key = args[0]\n valAsbytes, err := stub.GetState(key)\n if err != nil {\n jsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n return nil, errors.New(jsonResp)\n }\n\n return valAsbytes, nil\n}", "title": "" }, { "docid": "1c588f30d35f6277759bae129e09e612", "score": "0.5923422", "text": "func (t *SimpleChaincode2) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "32c1d67193e971bc981bbfb43f604dad", "score": "0.5917173", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\r\n\tvar key, jsonResp string\r\n\tvar err error\r\n\r\n\tif len(args) != 1 {\r\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\r\n\t}\r\n\r\n\tkey = args[0]\r\n\tvalAsbytes, err := stub.GetState(key)\r\n\tif err != nil {\r\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\r\n\t\treturn nil, errors.New(jsonResp)\r\n\t}\r\n\r\n\treturn valAsbytes, nil\r\n}", "title": "" }, { "docid": "d98ffcb59a91120216657752a6a3a0dd", "score": "0.59006935", "text": "func (vk *VerifyingKey) ReadFrom(r io.Reader) (n int64, err error) {\n\n\tvar read int\n\tvar buf [curve.SizeOfGT]byte\n\n\tread, err = io.ReadFull(r, buf[:8])\n\tn += int64(read)\n\tif err != nil {\n\t\treturn\n\t}\n\tlPublicInputs := binary.BigEndian.Uint64(buf[:8])\n\n\tbPublicInputs := make([]byte, lPublicInputs)\n\tread, err = io.ReadFull(r, bPublicInputs)\n\tn += int64(read)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = cbor.Unmarshal(bPublicInputs, &vk.PublicInputs)\n\tif err != nil {\n\t\treturn\n\t}\n\n\t// read vk.E\n\n\tread, err = r.Read(buf[:])\n\tn += int64(read)\n\tif err != nil {\n\t\treturn\n\t}\n\terr = vk.E.SetBytes(buf[:])\n\tif err != nil {\n\t\treturn\n\t}\n\n\tdec := curve.NewDecoder(r)\n\n\terr = dec.Decode(&vk.G2.GammaNeg)\n\tn += dec.BytesRead()\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = dec.Decode(&vk.G2.DeltaNeg)\n\tn += dec.BytesRead()\n\tif err != nil {\n\t\treturn\n\t}\n\n\terr = dec.Decode(&vk.G1.K)\n\tn += dec.BytesRead()\n\n\treturn\n}", "title": "" }, { "docid": "4538f1002069a30f7569a89fc1146c0d", "score": "0.58778864", "text": "func (t *Blocktrust) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "4120187ab97a5c3f17ca21738b3f4f50", "score": "0.5804338", "text": "func (b *backend) pathKeyRead(ctx context.Context, req *logical.Request, d *framework.FieldData) (*logical.Response, error) {\n\n\troleName := d.Get(\"role\").(string)\n\n\trole, err := b.GetRole(ctx, req.Storage, roleName)\n\tif err != nil {\n\t\treturn nil, errwrap.Wrapf(\"error fetching role: {{err}}\", err)\n\t}\n\n\tnewKeyName := fmt.Sprintf(\"%s%s\", role.UserNamePrefix, req.ID)\n\n\t// Calculate lifetime\n\treqTTL := time.Duration(d.Get(\"ttl\").(int)) * time.Second\n\tttl, _, err := framework.CalculateTTL(b.System(), 0, role.DefaultTTL, reqTTL, role.MaxTTL, 0, time.Time{})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Generate new accessKey\n\tnewKey, err := b.minioAccessKeyCreate(ctx, req.Storage, newKeyName, role.Policy)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Gin up response\n\tresp := b.Secret(minioKeyType).Response(map[string]interface{}{\n\t\t// Returned secret\n\t\t\"accessKeyId\": newKeyName,\n\t\t\"secretAccessKey\": newKey.SecretKey,\n\t\t\"accountStatus\": newKey.Status,\n\t\t\"policy\": newKey.PolicyName,\n\t}, map[string]interface{}{\n\t\t// Internal Data\n\t\t\"accessKeyId\": newKeyName,\n\t})\n\n\tresp.Secret.TTL = ttl\n\tresp.Secret.MaxTTL = role.MaxTTL\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "a55e6b6ddced0aa73cfecbac495bfbf8", "score": "0.57982266", "text": "func ReadDKV(key string) []byte {\n\n\tkey += \"_hs.log\"\n\tvalue, err := dkv.Read(key)\n\tif err != nil {\n\t\t// ignore\n\t\t// fmt.Fprint(os.Stderr, \"unable to read from diskv \"+err.Error()+\"\\n\")\n\t\treturn nil\n\t}\n\treturn value\n}", "title": "" }, { "docid": "b54f6d62adbaf51f211c549c6dafc9e5", "score": "0.57570434", "text": "func ReadKey(v string) ClientOption {\n\treturn func(c *Client) error {\n\t\tc.ReadKey = v\n\t\treturn nil\n\t}\n}", "title": "" }, { "docid": "dc95bb1f6016e12f3729e779c1080625", "score": "0.5749856", "text": "func (t *SimpleChaincode) read(stub *shim.ChaincodeStub, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tkey = args[0]\n\tvalAsBytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsBytes, nil\n}", "title": "" }, { "docid": "1bc65c0bf68214cde0623bf20a8bda89", "score": "0.57460994", "text": "func (o *SSHKeyOp) Read(ctx context.Context, id types.ID) (*SSHKey, error) {\n\t// build request URL\n\tpathBuildParameter := map[string]interface{}{\n\t\t\"rootURL\": SakuraCloudAPIRoot,\n\t\t\"pathSuffix\": o.PathSuffix,\n\t\t\"pathName\": o.PathName,\n\t\t\"zone\": APIDefaultZone,\n\t\t\"id\": id,\n\t}\n\n\turl, err := buildURL(\"{{.rootURL}}/{{.zone}}/{{.pathSuffix}}/{{.pathName}}/{{.id}}\", pathBuildParameter)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// build request body\n\tvar body interface{}\n\n\t// do request\n\tdata, err := o.Client.Do(ctx, \"GET\", url, body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// build results\n\tresults, err := o.transformReadResults(data)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn results.SSHKey, nil\n}", "title": "" }, { "docid": "d16ab9a8e953dda95c4c11e6512f2427", "score": "0.5727021", "text": "func read(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar key, jsonResp string\n\tvar err error\n\tfmt.Println(\"starting read\")\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting key of the var to query\")\n\t}\n\n\t// input sanitation\n\terr = sanitize_arguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key) //get the var from ledger\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\n\tfmt.Println(\"- end read\")\n\treturn shim.Success(valAsbytes) //send it onward\n}", "title": "" }, { "docid": "53e3cf5e492b8d6091154aace7018ef0", "score": "0.5720589", "text": "func readNode(key string) int {\n\tlock.RLock()\n\tdefer lock.RUnlock()\n\treturn Nodes[key]\n}", "title": "" }, { "docid": "0d0d819bdd11689dc22585aaa25a1d37", "score": "0.57117313", "text": "func read(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar key, jsonResp string\n\tvar err error\n\tfmt.Println(\"starting read\")\n\n\tif len(args) != 2 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting key of the var to query\")\n\t}\n\n\t// input sanitation\n\terr = sanitize_arguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tkey = args[1]\n\tvalAsbytes, err := stub.GetState(key) //get the var from ledger\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\n\tfmt.Println(\"- end read\")\n\treturn shim.Success(valAsbytes) //send it onward\n}", "title": "" }, { "docid": "c44e8acd8d708bfbbcdf9dc7cce12f1b", "score": "0.5691727", "text": "func (c *Conn) Read(k []byte) ([]byte, error) {\n\tret := []byte{}\n\terr := c.db.View(func(txn *badger.Txn) error {\n\t\titem, err := txn.Get(k)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tret, err = item.Value()\n\t\treturn err\n\t})\n\treturn ret, err\n}", "title": "" }, { "docid": "89de8681353bd7602ab1652f60e46942", "score": "0.5679283", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\t//var key, jsonResp string\n\t//var err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\t//key = args[0]\n\t//valAsbytes, err := stub.GetState(key)\n//\tx:=int64(count)\n// str1:=strconv.FormatInt(x,10)\n//\tvalAsbytes:=[]byte(str1)\n\tresp, _ := http.Get(\"http://www.bbc.com\")\n \tbb, _ := ioutil.ReadAll(resp.Body)\n\tvalAsbytes:=bb[0:50]\n\t//if err != nil {\n\t//\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t//\treturn nil, errors.New(jsonResp)\n\t//}\n\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "89de8681353bd7602ab1652f60e46942", "score": "0.5679283", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\t//var key, jsonResp string\n\t//var err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\t//key = args[0]\n\t//valAsbytes, err := stub.GetState(key)\n//\tx:=int64(count)\n// str1:=strconv.FormatInt(x,10)\n//\tvalAsbytes:=[]byte(str1)\n\tresp, _ := http.Get(\"http://www.bbc.com\")\n \tbb, _ := ioutil.ReadAll(resp.Body)\n\tvalAsbytes:=bb[0:50]\n\t//if err != nil {\n\t//\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t//\treturn nil, errors.New(jsonResp)\n\t//}\n\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "ca874c88c437ea14ae4ef1718c6fb0e1", "score": "0.5622342", "text": "func (g *generator) randKeyToRead(newKey float64) []byte {\n\treturn g.randKeyHelper(g.keyManager.eligibleReadKeys(), newKey, nil)\n}", "title": "" }, { "docid": "c75e19ba3895bb7f29c7cbbd24a7aad4", "score": "0.5603358", "text": "func (kp KeyPrinter) Read(out Key, in []byte) (err error) {\n\tsize := kp.EncodedSize(out)\n\tif len(in) > size {\n\t\terr = ErrKeyTooShort\n\t\treturn\n\t} else if len(in) < size {\n\t\terr = ErrInputTooShort\n\t\treturn\n\t}\n\t_, err = hex.Decode(out.Bytes(), in)\n\treturn\n\n}", "title": "" }, { "docid": "8b5f255980a50ab9e6670451d8f4d52d", "score": "0.55834913", "text": "func Read(stub *shim.ChaincodeStub, args []string) ([]byte, error) {\n\tvar key, jsonResp string\n\tvar err error\n\n\tif len(args) != 2 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the key to query\")\n\t}\n\n\tkey = args[0]\n\tvalAsbytes, err := stub.GetState(key)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + key + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\n}", "title": "" }, { "docid": "0e4ffe6bf2142ddf44ced4b225ce98a0", "score": "0.5581564", "text": "func (r *lockedSource) read(p []byte, readVal *int64, readPos *int8) (n int, err error) {\n r.lk.Lock()\n n, err = read(p, r.src.Int63, readVal, readPos)\n r.lk.Unlock()\n return\n}", "title": "" }, { "docid": "84aeb6219871e95392982e08ceb31c39", "score": "0.55715984", "text": "func (s *storeService) read(kg KeygroupName, id string) (string, error) {\n\terr := checkKGandID(kg, id)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tif !s.iS.ExistsKeygroup(string(kg)) {\n\t\treturn \"\", errors.Errorf(\"no such keygroup in store: %#v\", kg)\n\t}\n\n\tdata, err := s.iS.Read(string(kg), id)\n\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn data, nil\n}", "title": "" }, { "docid": "ecfaaa84cc96dec9abfae7e9929093c2", "score": "0.55540115", "text": "func (c Config) Read(node, key string) string {\n\tkey = node + middle + key\n\tv, found := c.Configmap[key]\n\tif !found {\n\t\treturn \"\"\n\t}\n\treturn v\n}", "title": "" }, { "docid": "f7db36b805da8f8e55c3b6a659bb6cb7", "score": "0.5545787", "text": "func (c *reflectMapCodec) readKey(d *Decoder, keyType reflect.Type) (key reflect.Value, err error) {\n\tswitch keyType.Kind() {\n\tcase reflect.Int16:\n\t\tvar v uint16\n\t\tif v, err = d.ReadUint16(); err == nil {\n\t\t\tkey = reflect.ValueOf(int16(v))\n\t\t}\n\tcase reflect.Int32:\n\t\tvar v uint32\n\t\tif v, err = d.ReadUint32(); err == nil {\n\t\t\tkey = reflect.ValueOf(int32(v))\n\t\t}\n\tcase reflect.Int64:\n\t\tvar v uint64\n\t\tif v, err = d.ReadUint64(); err == nil {\n\t\t\tkey = reflect.ValueOf(int64(v))\n\t\t}\n\n\tcase reflect.Uint16:\n\t\tvar v uint16\n\t\tif v, err = d.ReadUint16(); err == nil {\n\t\t\tkey = reflect.ValueOf(v)\n\t\t}\n\tcase reflect.Uint32:\n\t\tvar v uint32\n\t\tif v, err = d.ReadUint32(); err == nil {\n\t\t\tkey = reflect.ValueOf(v)\n\t\t}\n\tcase reflect.Uint64:\n\t\tvar v uint64\n\t\tif v, err = d.ReadUint64(); err == nil {\n\t\t\tkey = reflect.ValueOf(v)\n\t\t}\n\n\t// String keys must have max length of 65536\n\tcase reflect.String:\n\t\tvar l uint16\n\t\tvar b []byte\n\n\t\tif l, err = d.ReadUint16(); err == nil {\n\t\t\tif b, err = d.Slice(int(l)); err == nil {\n\t\t\t\tkey = reflect.ValueOf(string(b))\n\t\t\t}\n\t\t}\n\n\t// Default to a reflect-based approach\n\tdefault:\n\t\tkey = reflect.New(keyType).Elem()\n\t\terr = c.key.DecodeTo(d, key)\n\t}\n\treturn\n}", "title": "" }, { "docid": "2d37acfad6612af9d627b8ab899cae7a", "score": "0.55360293", "text": "func (s _objects) read(pk types.PrimaryKey, target types.Object) bool {\n\tv := s.store.Get(pk.Key())\n\tif v == nil {\n\t\treturn false\n\t}\n\ts.decode(v, target)\n\treturn true\n}", "title": "" }, { "docid": "19aa5f7e2ae6618fada71df6d74887be", "score": "0.5533041", "text": "func NewKVRead(key string, version *version.Height) *kvrwset.KVRead {\n\treturn &kvrwset.KVRead{Key: key, Version: newProtoVersion(version)}\n}", "title": "" }, { "docid": "369b61bb209192eb4e3fb561515aff0c", "score": "0.5532544", "text": "func (c *CollectionBuilder) Read(key string, blockNum uint64, txIdx uint64) *CollectionBuilder {\n\tc.reads[key] = &kvrwset.Version{BlockNum: blockNum, TxNum: txIdx}\n\treturn c\n}", "title": "" }, { "docid": "c4a438ca5bff958b0208d2cd23895c75", "score": "0.5516646", "text": "func (k *KeyLogger) read() (*InputEvent, error) {\n\tbuffer := make([]byte, eventsize)\n\tn, err := k.fd.Read(buffer)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\t// no input, dont send error\n\tif n <= 0 {\n\t\treturn nil, nil\n\t}\n\treturn k.eventFromBuffer(buffer)\n}", "title": "" }, { "docid": "2780d8aae0f573230407f39d29c4ad34", "score": "0.5509077", "text": "func (s *SecretStore) Read(key string) (io.Reader, error) {\n\tdata, ok := s.Data[key]\n\tif !ok {\n\t\treturn nil, KeyNotFoundError(key)\n\t}\n\n\treturn bytes.NewReader(data), nil\n}", "title": "" }, { "docid": "500d678efd91e672650d1b77164dbed1", "score": "0.55086637", "text": "func read(lex *lexer, v reflect.Value) {\n\tswitch lex.token {\n\tcase scanner.Ident:\n\t\t// The only valid identifiers are\n\t\t// \"nil\" and struct field names.\n\t\tif lex.text() == \"nil\" {\n\t\t\tv.Set(reflect.Zero(v.Type()))\n\t\t\tlex.next()\n\t\t\treturn\n\t\t}\n\tcase scanner.String:\n\t\ts, _ := strconv.Unquote(lex.text()) // NOTE: ignoring errors\n\t\tv.SetString(s)\n\t\tlex.next()\n\t\treturn\n\tcase scanner.Int:\n\t\ti, _ := strconv.Atoi(lex.text()) // NOTE: ignoring errors\n\t\tv.SetInt(int64(i))\n\t\tlex.next()\n\t\treturn\n\tcase '(':\n\t\tlex.next()\n\t\treadList(lex, v)\n\t\tlex.next() // consume ')'\n\t\treturn\n\t}\n\tpanic(fmt.Sprintf(\"unexpected token %q\", lex.text()))\n}", "title": "" }, { "docid": "8b901b6ca9641f3ada33b61435788293", "score": "0.5498804", "text": "func (l *Log) read(chain uint64, key []byte) []byte {\n\tif chain == 0 {\n\t\tchain = l.p.Chain\n\t}\n\tassert(chain/2 == l.p.Chain || l.p.Chain/2 == chain || l.p.Chain == chain)\n\tminLife := l.p.Time\n\tif chain != l.p.Chain {\n\t\tminLife -= blockSyncMin\n\t}\n\tmaxLife := minLife + TimeYear\n\n\tout, life := l.p.LogRead(l.owner, chain, key)\n\tif life < minLife || life > maxLife {\n\t\treturn nil\n\t}\n\treturn out\n}", "title": "" }, { "docid": "dc68f8fb9fb58f7e5dd01d16f9f14a5e", "score": "0.54683816", "text": "func (f FakeVaultClient) Read(secretName string) (map[string]interface{}, error) {\n\tif answer, ok := f.Data[secretName]; !ok {\n\t\treturn nil, errors.Errorf(\"secret does not exist at key %s\", secretName)\n\t} else {\n\t\treturn answer, nil\n\t}\n}", "title": "" }, { "docid": "08e9569940b54ee106827ea2650042e3", "score": "0.54629153", "text": "func Read(key string) (name string) {\n\tdb.View(func(tx *bolt.Tx) error {\n\t\tif b := tx.Bucket(bucket).Bucket([]byte(key)); b != nil {\n\t\t\tif value := b.Get([]byte(\"name\")); value != nil {\n\t\t\t\tname = string(value)\n\t\t\t}\n\t\t}\n\t\treturn nil\n\t})\n\treturn name\n}", "title": "" }, { "docid": "220c6b29e33c815ca4f6442ca1ffafc3", "score": "0.54519373", "text": "func (d *eventDispatcher) readFuncKey(buf *bytes.Buffer) (bool, bool, error) {\n\tb := buf.Bytes()\n\tpartial := false\n\tfor kk, kv := range d.keyCodes {\n\t\tesc := []byte(kk)\n\t\tif (len(esc) == 1) && (esc[0] == '\\x1b') {\n\t\t\tcontinue\n\t\t}\n\t\tif bytes.HasPrefix(b, esc) {\n\t\t\t// matched\n\t\t\tvar r rune\n\t\t\tif len(esc) == 1 {\n\t\t\t\tr = rune(b[0])\n\t\t\t}\n\t\t\tmod := kv.Mod\n\t\t\tif d.escaped {\n\t\t\t\tmod |= ModAlt\n\t\t\t\td.escaped = false\n\t\t\t}\n\t\t\tev := NewEvent(kv.Key, r, mod) // one event for everyone\n\t\t\tfor _, cons := range d.receivers {\n\t\t\t\tcons <- ev\n\t\t\t}\n\t\t\tfor i := 0; i < len(esc); i++ {\n\t\t\t\tif _, err := buf.ReadByte(); err != nil {\n\t\t\t\t\treturn false, false, err\n\t\t\t\t}\n\t\t\t}\n\t\t\treturn true, true, nil\n\t\t}\n\t\tif bytes.HasPrefix(esc, b) {\n\t\t\tpartial = true\n\t\t}\n\t}\n\treturn partial, false, nil\n}", "title": "" }, { "docid": "fafb6d54c3608e68e9ae5ca43bc52495", "score": "0.5441057", "text": "func (h *Helper) read(serverURL string) (*credentials.Credentials, error) {\n\tpath, err := h.pathForServerURL(serverURL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tmountPath, v2, err := isKVv2(path, h.client)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif v2 {\n\t\tpath = addPrefixToVKVPath(path, mountPath, \"data\")\n\t}\n\tsecret, err := kvReadRequest(h.client, path, nil)\n\tif err != nil || secret == nil {\n\t\tfmt.Fprintf(os.Stderr, \"Failed to read %s: %v\\n\", path, err)\n\t}\n\n\tdata := secret.Data\n\tif v2 && data != nil {\n\t\tdata = nil\n\t\tdataRaw := secret.Data[\"data\"]\n\t\tif dataRaw != nil {\n\t\t\tdata = dataRaw.(map[string]interface{})\n\t\t}\n\t}\n\treturn secretDataToCredential(data)\n}", "title": "" }, { "docid": "0ddac678575f969fb323058b1bdfb174", "score": "0.543528", "text": "func (this *Segment) get(key interface{}, hash uint32) interface{} {\n\tif atomic.LoadInt32(&this.count) != 0 { // atomic-read\n\t\te := this.getFirst(hash)\n\t\tfor e != nil {\n\t\t\tif e.hash == hash && equals(e.key, key) {\n\t\t\t\tv := e.Value()\n\t\t\t\tif v != nil {\n\t\t\t\t\t//return\n\t\t\t\t\treturn v\n\t\t\t\t}\n\t\t\t\treturn this.readValueUnderLock(e) // recheck\n\t\t\t}\n\t\t\te = e.next\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "5beb9a393441d2836a5e360533312d6d", "score": "0.5426823", "text": "func read(ctx context.Context, path string, v interface{}) error {\n\tf, err := os.Open(path)\n\tlogging.Debugf(ctx, \"Reading file: %s\", path)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer f.Close()\n\n\tdec := json.NewDecoder(f)\n\terr = dec.Decode(v)\n\treturn err\n}", "title": "" }, { "docid": "cb3eacd8b7db851f52c3fff9b0368769", "score": "0.5424377", "text": "func (c *Client) Read(path string) (*api.Secret, error) {\n\tmountPath, v2, err := c.isKVv2(path)\n\tif err != nil {\n\t\treturn nil, stacktrace.Propagate(\n\t\t\terr,\n\t\t\t\"failed to determine if remote Vault supports v2 or v1 kv secret storage\",\n\t\t)\n\t}\n\n\t// NOTE: v2 api puts the data given inside a JSON key `data`.\n\t// ref: https://www.vaultproject.io/api/secret/kv/kv-v2.html#create-update-secret\n\tvar versionParam map[string]string\n\n\tif v2 {\n\t\tpath = c.addPrefixToVKVPath(path, mountPath, \"data\")\n\t\tversionParam = map[string]string{\n\t\t\t\"version\": fmt.Sprintf(\"%d\", latestVersion),\n\t\t}\n\t}\n\n\tsecret, err := c.kvReadRequest(path, versionParam)\n\tif err != nil {\n\t\treturn nil, stacktrace.Propagate(\n\t\t\terr,\n\t\t\t\"error reading from Vault path: %s, version: %s\",\n\t\t\tpath,\n\t\t\tversionParam,\n\t\t)\n\t}\n\n\tif v2 && secret != nil {\n\t\tdata, ok := secret.Data[\"data\"]\n\n\t\tif ok && data != nil {\n\t\t\tdataMap, ok := data.(map[string]interface{})\n\t\t\tif ok {\n\t\t\t\tsecret.Data = dataMap\n\t\t\t} else {\n\t\t\t\t// NOTE: It really makes no sense to be anything different than\n\t\t\t\t// a map, otherwise this means that fundamentally Vault has changed\n\t\t\t\t// its storage design and does not provide key-values at `path`.\n\t\t\t\t// However don't show the actual value, since it will leak plaintext secrets.\n\t\t\t\tlogger.Warnf(\"secret value at path %q is not a key-value map\", path)\n\t\t\t\tsecret.Data = nil\n\t\t\t}\n\t\t} else {\n\t\t\tsecret.Data = nil\n\t\t}\n\t}\n\n\treturn secret, nil\n}", "title": "" }, { "docid": "3aef501ce2af93c409e29d05fd31146a", "score": "0.5422637", "text": "func readInvVect(r io.Reader, iv *InvVect) error {\n\terr := ReadElements(r, (*hash.Sha)(iv))\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d52404afebffc1e2753c3168cc2d4d5f", "score": "0.5420942", "text": "func read(key, namespaceID string) ([]byte, error) {\n\tvar bytes []byte\n\tvar err error\n\tfor i := 0; i < util.MaxKVAttempts; i++ {\n\t\tbytes, err = api.ReadWorkersKV(context.Background(), namespaceID, key)\n\t\tif err != nil {\n\t\t\terrString := err.Error()\n\n\t\t\t// check for service failure and retry\n\t\t\tif strings.Contains(errString, serviceFailure) {\n\t\t\t\tcontinue\n\t\t\t}\n\n\t\t\t// check for key not found\n\t\t\tif strings.Contains(errString, keyNotFound) {\n\t\t\t\treturn nil, KeyNotFoundError{key, errString}\n\t\t\t}\n\n\t\t\t// check for authentication error\n\t\t\tif strings.Contains(errString, authError) {\n\t\t\t\treturn nil, AuthError{errString}\n\t\t\t}\n\t\t}\n\n\t\tbreak\n\t}\n\n\treturn bytes, err\n}", "title": "" }, { "docid": "18bdd866a7a5172339c51251755e45ca", "score": "0.5412151", "text": "func GetReadKey(w http.ResponseWriter, req *http.Request) {\n\tw.Header().Set(\"Content-Type\", \"text/plain\")\n\treq.ParseForm()\n\n\tDBRest(\"GET\", w, req)\n}", "title": "" }, { "docid": "631a2e2fb73894a8992ff465e8135aa1", "score": "0.54081583", "text": "func (v *Vault) Read(path string) (secret *Secret, err error) {\n\t//split at last colon, if present\n\tpath, key := ParsePath(path)\n\n\tsecret = NewSecret()\n\treq, err := http.NewRequest(\"GET\", v.url(\"/v1/%s\", path), nil)\n\tif err != nil {\n\t\treturn\n\t}\n\tres, err := v.request(req)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tswitch res.StatusCode {\n\tcase 200:\n\t\tbreak\n\tcase 404:\n\t\terr = NewSecretNotFoundError(path)\n\t\treturn\n\tdefault:\n\t\terr = fmt.Errorf(\"API %s\", res.Status)\n\t\treturn\n\t}\n\n\tb, err := ioutil.ReadAll(res.Body)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tvar raw map[string]interface{}\n\tif err = json.Unmarshal(b, &raw); err != nil {\n\t\treturn\n\t}\n\n\tif rawdata, ok := raw[\"data\"]; ok {\n\t\tif data, ok := rawdata.(map[string]interface{}); ok {\n\t\t\tfor k, v := range data {\n\t\t\t\tif (key != \"\" && k == key) || key == \"\" {\n\t\t\t\t\tif s, ok := v.(string); ok {\n\t\t\t\t\t\tsecret.data[k] = s\n\t\t\t\t\t} else {\n\t\t\t\t\t\tb, err = json.Marshal(v)\n\t\t\t\t\t\tif err != nil {\n\t\t\t\t\t\t\treturn\n\t\t\t\t\t\t}\n\t\t\t\t\t\tsecret.data[k] = string(b)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif key != \"\" && len(secret.data) == 0 {\n\t\t\t\terr = NewKeyNotFoundError(path, key)\n\t\t\t}\n\t\t\treturn\n\t\t}\n\t}\n\terr = fmt.Errorf(\"malformed response from vault\")\n\treturn\n}", "title": "" }, { "docid": "d51dfafd13100fd17c68d5bd001edf7c", "score": "0.5403078", "text": "func (f *FSM) get(key string) (string, error) {\n\tf.RLock()\n\tdefer f.RUnlock()\n\n\treturn f.rb.Bucket(dbData).Get([]byte(key))\n}", "title": "" }, { "docid": "49f2ab2530fa18dfc23a21825d73f1cf", "score": "0.5382847", "text": "func (v View) Read(id NID) *Node {\n\tn, ok := v[id]\n\tif !ok {\n\t\treturn nil\n\t}\n\n\treturn &n\n}", "title": "" }, { "docid": "604a1c900818e4aefead765b96d82d72", "score": "0.5367805", "text": "func (s *Store) Read(k string) ([]byte, error) {\n\ts.mutex.RLock()\n\tdefer s.mutex.RUnlock()\n\t// check cache first\n\tif v, ok := s.cache[k]; ok {\n\t\treturn v, nil\n\t}\n\t// read from disk\n\tv, err := ioutil.ReadFile(s.filename(k))\n\tif err != nil {\n\t\treturn []byte{}, err\n\t}\n\t// cache lazily\n\tgo s.cacheWithoutLock(k, v)\n\treturn v, nil\n}", "title": "" }, { "docid": "9cb0bca1b3acdad8233f2c909c9c1157", "score": "0.53563935", "text": "func (s *Store) Read(key []byte) ([]byte, error) {\n\tvar data []byte\n\terr := ValidateKey(key)\n\tif err != nil {\n\t\treturn data, err\n\t}\n\terr = s.db.View(func(txn *badger.Txn) error {\n\t\tvar err error\n\t\tb := NewBadgerBackend(txn)\n\t\tidx := NewIndex(b)\n\t\tsc, err := idx.Read(key)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tdl := NewDatalog(b)\n\t\tdata, err = dl.Read(sc)\n\t\treturn err\n\t})\n\treturn data, err\n}", "title": "" }, { "docid": "55690deca3a64615e078b8447a1aa8c0", "score": "0.53492373", "text": "func (m *MemorySource) Read(key string) (string, bool) {\n\tvalue, ok := m.cache[key]\n\treturn value, ok\n}", "title": "" }, { "docid": "d920e3c49292cd4e3b6f2365eaeb7d49", "score": "0.5339291", "text": "func (reader *LVDBReader) Get(key []byte) ([]byte, error) {\n\toptions := defaultReadOptions()\n\tb, err := reader.snapshot.Get(key, options)\n\tif err == leveldb.ErrNotFound {\n\t\treturn nil, nil\n\t}\n\treturn b, err\n}", "title": "" }, { "docid": "e309007da75eaf414bced4619f4d9f40", "score": "0.53232557", "text": "func (b *NamespaceBuilder) Read(key string, blockNum uint64, txIdx uint64) *NamespaceBuilder {\n\tb.reads[key] = &kvrwset.Version{BlockNum: blockNum, TxNum: txIdx}\n\treturn b\n}", "title": "" }, { "docid": "4ddcadb0e669f8de58858a9692844da4", "score": "0.53153217", "text": "func (g *GID) VRead() bool {\n\treturn g.gid&tileFlippedVertical != 0\n}", "title": "" }, { "docid": "30477f5f0ffa79a856e0b160605326ed", "score": "0.5302908", "text": "func (m *memTable) get(key []byte) (value []byte, err error) {\n\tit := m.skl.NewIter(nil, nil)\n\tikey, val := it.SeekGE(key, base.SeekGEFlagsNone)\n\tif ikey == nil {\n\t\treturn nil, ErrNotFound\n\t}\n\tif !m.equal(key, ikey.UserKey) {\n\t\treturn nil, ErrNotFound\n\t}\n\tswitch ikey.Kind() {\n\tcase InternalKeyKindDelete, InternalKeyKindSingleDelete, InternalKeyKindDeleteSized:\n\t\treturn nil, ErrNotFound\n\tdefault:\n\t\treturn val.InPlaceValue(), nil\n\t}\n}", "title": "" }, { "docid": "86cb43c742e1e35a76b672b87d3c17bd", "score": "0.52937275", "text": "func readSecret(vault *api.Client, path string) (string, error) {\n\ts, err := vault.Logical().Read(path)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tif s == nil || s.Data == nil {\n\t\treturn \"\", errors.New(\"Couldn't read secret\")\n\t}\n\treturn s.Data[\"value\"].(string), nil\n}", "title": "" }, { "docid": "3291d13b0c91fd422a9b3c2c3687cdab", "score": "0.52748156", "text": "func (s *MockStore) ReadVersion(id SecretIdentifier, version int) (Secret, error) {\n\treturn Secret{}, nil\n}", "title": "" }, { "docid": "622183b14cf69bb098ed1f7a34582bbc", "score": "0.5269657", "text": "func read_voter(stub shim.ChaincodeStubInterface, args []string) pb.Response {\n\tvar jsonResp string\n\tvar err error\n\tfmt.Println(\"starting read_voter\")\n\n\tif len(args) != 1 {\n\t\treturn shim.Error(\"Incorrect number of arguments. Expecting key of the var to query\")\n\t}\n\n\t// input sanitation\n\terr = sanitize_arguments(args)\n\tif err != nil {\n\t\treturn shim.Error(err.Error())\n\t}\n\n\tvid := args[0]\n\tvoterAsBytes, err := stub.GetState(vid)\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + vid + \"\\\"}\"\n\t\treturn shim.Error(jsonResp)\n\t}\n\n\tvar voter Voter\n\tjson.Unmarshal(voterAsBytes, &voter)\n\tfmt.Println(voter)\n\tfmt.Println(\"- end read\")\n\n\treturn shim.Success(voterAsBytes) //send it onward\n}", "title": "" }, { "docid": "7949e7b1bceb611fa6668bb12a7f034c", "score": "0.5259459", "text": "func (v *VDR) Read(didKey string, _ ...vdrapi.DIDMethodOption) (*did.DocResolution, error) {\n\tparsed, err := did.Parse(didKey)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"pub:key vdr Read: failed to parse DID document: %w\", err)\n\t}\n\n\tif parsed.Method != \"key\" {\n\t\treturn nil, fmt.Errorf(\"vdr Read: invalid did:key method: %s\", parsed.Method)\n\t}\n\n\tif !isValidMethodID(parsed.MethodSpecificID) {\n\t\treturn nil, fmt.Errorf(\"vdr Read: invalid did:key method ID: %s\", parsed.MethodSpecificID)\n\t}\n\n\tpubKeyBytes, code, err := fingerprint.PubKeyFromFingerprint(parsed.MethodSpecificID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"pub:key vdr Read: failed to get key fingerPrint: %w\", err)\n\t}\n\n\tdidDoc, err := createDIDDocFromPubKey(parsed.MethodSpecificID, code, pubKeyBytes)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"creating did document from public key failed: %w\", err)\n\t}\n\n\treturn &did.DocResolution{Context: []string{schemaResV1}, DIDDocument: didDoc}, nil\n}", "title": "" }, { "docid": "cfbe4d436559f0a302e4df63893ecc82", "score": "0.5258099", "text": "func (r *Reader) Get(key []byte) ([]byte, error) {\n\tvalue, _, err := r.find(key, nil)\n\treturn value, err\n}", "title": "" }, { "docid": "315aee187fbb052091b2a44e013c8bc0", "score": "0.52473813", "text": "func (r *Ring) get(p int) interface{} {\n\treturn r.buf[r.mod(p)]\n}", "title": "" }, { "docid": "074a2c33902623a821bcb60d18892405", "score": "0.5246444", "text": "func reader(mutex *sync.RWMutex, state map[int]int) {\n\tfor {\n\t\tkey := rand.Intn(5)\n\t\tmutex.RLock() // Lock for reading\n\t\tfmt.Printf(\"Reading key %d - %d\\n\", key, state[key])\n\t\tmutex.RUnlock() // Unlock for reading (could use defer as safer)\n\t\ttime.Sleep(time.Millisecond)\n\t}\n}", "title": "" }, { "docid": "b6b9f648f5f69be9e23aad1223567f61", "score": "0.5240997", "text": "func (v *Validator) validateKVRead(ns string, kvRead *kvrwset.KVRead, updates *statedb.UpdateBatch) (bool, error) {\n\tif updates.Exists(ns, kvRead.Key) {\n\t\treturn false, nil\n\t}\n\tversionedValue, err := v.db.GetState(ns, kvRead.Key)\n\tif err != nil {\n\t\treturn false, nil\n\t}\n\tvar committedVersion *version.Height\n\tif versionedValue != nil {\n\t\tcommittedVersion = versionedValue.Version\n\t}\n\n\tif !version.AreSame(committedVersion, rwsetutil.NewVersion(kvRead.Version)) {\n\t\tlogger.Debugf(\"Version mismatch for key [%s:%s]. Committed version = [%s], Version in readSet [%s]\",\n\t\t\tns, kvRead.Key, committedVersion, kvRead.Version)\n\t\treturn false, nil\n\t}\n\treturn true, nil\n}", "title": "" }, { "docid": "133473ad744b1067c34bb3d166dc5a63", "score": "0.52365005", "text": "func (g *generator) randKeyToReadInRange(newKey float64, kr pebble.KeyRange) []byte {\n\treturn g.randKeyHelper(g.keyManager.eligibleReadKeysInRange(kr), newKey, &kr)\n}", "title": "" }, { "docid": "d1a9a5b1acaf4e8c2808075c7ece62b7", "score": "0.52323943", "text": "func ReadKey(path string) (string, error) {\n\tb, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(b), nil\n}", "title": "" }, { "docid": "7c49bfe6f56838087a5585691e4a9409", "score": "0.5230966", "text": "func Read(name string, v interface{}) error {\n\tenc, found := encodings[filepath.Ext(name)]\n\tif !found {\n\t\tenc = defenc\n\t}\n\treturn enc.Read(name, v)\n}", "title": "" }, { "docid": "ce132f0dfd195564e7e157431f0202e3", "score": "0.5203477", "text": "func (yw *ycsbWorker) nextReadKey() uint64 {\n\tvar hashedKey uint64\n\tkey := yw.zipfR.Uint64()\n\thashedKey = yw.hashKey(key)\n\tif *verbose {\n\t\tfmt.Printf(\"reader: %d -> %d\\n\", key, hashedKey)\n\t}\n\treturn hashedKey\n}", "title": "" }, { "docid": "71fde7c9cd7f734547067f3cbcc77be6", "score": "0.5198943", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the var to query\")\n\t}\n\n\tname = args[0]\n\tvalAsbytes, err := stub.GetState(name)\t\t\t\t\t\t\t\t\t//get the var from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + name + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\t\t\t\t\t\t\t\t\t\t\t\t\t//send it onward\n}", "title": "" }, { "docid": "71fde7c9cd7f734547067f3cbcc77be6", "score": "0.5198943", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the var to query\")\n\t}\n\n\tname = args[0]\n\tvalAsbytes, err := stub.GetState(name)\t\t\t\t\t\t\t\t\t//get the var from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + name + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\t\t\t\t\t\t\t\t\t\t\t\t\t//send it onward\n}", "title": "" }, { "docid": "71fde7c9cd7f734547067f3cbcc77be6", "score": "0.5198943", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the var to query\")\n\t}\n\n\tname = args[0]\n\tvalAsbytes, err := stub.GetState(name)\t\t\t\t\t\t\t\t\t//get the var from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + name + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil\t\t\t\t\t\t\t\t\t\t\t\t\t//send it onward\n}", "title": "" }, { "docid": "4b683b91269b7b5df62761a82ed77437", "score": "0.5192583", "text": "func (t *SimpleChaincode) read(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar name, jsonResp string\n\tvar err error\n\n\tif len(args) != 1 {\n\t\treturn nil, errors.New(\"Incorrect number of arguments. Expecting name of the var to query\")\n\t}\n\n\tname = args[0]\n\tvalAsbytes, err := stub.GetState(name) //get the var from chaincode state\n\tif err != nil {\n\t\tjsonResp = \"{\\\"Error\\\":\\\"Failed to get state for \" + name + \"\\\"}\"\n\t\treturn nil, errors.New(jsonResp)\n\t}\n\n\treturn valAsbytes, nil //send it onward\n}", "title": "" }, { "docid": "5967f11cc5e0dd3df14c2ce6ac6d83c1", "score": "0.5191914", "text": "func ReadKey(key string) (string, error) {\n\tdata, err := ioutil.ReadFile(filepath.Join(MountPath, key))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(data), nil\n}", "title": "" }, { "docid": "6ea9eaf93c5ec599605b136e35f01659", "score": "0.51876754", "text": "func (s Store) Get(_ context.Context, key string) ([]byte, error) { return s.loadKey(key) }", "title": "" }, { "docid": "0b5702c6d32a1619bd401bbe2588da81", "score": "0.5187133", "text": "func readInvVect(r io.Reader, iv *InvVect) error {\n\terr := readElements(r, &iv.Hash)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "218b18b403f451909cee95cc564b116f", "score": "0.51864696", "text": "func (t *AssetMgmt) read(stub shim.ChaincodeStubInterface, args []string) peer.Response {\r\n\tfmt.Println(\"read() is running\")\r\n\r\n\tkey := args[0] // name of Account\r\n\r\n\tbytes, err := stub.GetState(key)\r\n\tif err != nil {\r\n\t\tfmt.Println(\"Error retrieving \" + key)\r\n\t\treturn shim.Error(\"Error retrieving \" + key)\r\n\t}\r\n\r\n\tfmt.Println(bytes)\r\n\treturn shim.Success(bytes)\r\n}", "title": "" }, { "docid": "2fe121b846e9a22d9052adb06148f23e", "score": "0.5181446", "text": "func (b *bucketLocker) read(bucket string) func() {\n\tload, _ := b.m.LoadOrStore(bucket, &sync.RWMutex{})\n\trw := load.(*sync.RWMutex)\n\trw.RLock()\n\treturn rw.RUnlock\n}", "title": "" }, { "docid": "0590cef5cda8443132af205b64f2fdde", "score": "0.5162475", "text": "func (r *Ring) get(p int) interface{} {\n\treturn r.buff[r.mod(p)]\n}", "title": "" }, { "docid": "04eab923839716cd8625267b33c69792", "score": "0.5160405", "text": "func readPubkey(r *http.Request) (ssh.PublicKey, error) {\n\tdata, err := io.ReadAll(r.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpubkey, _, _, _, err := ssh.ParseAuthorizedKey(data)\n\treturn pubkey, err\n}", "title": "" }, { "docid": "e233f1e208dfc3c577b958aa52f93fd5", "score": "0.51597756", "text": "func (s *RedisAuthenticator) ReadKey(key string) (string, error) {\n\tconn := s.pool.Get()\n\tdefer conn.Close()\n\n\treply, err := redis.String(conn.Do(\"GET\", key))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn reply, nil\n}", "title": "" }, { "docid": "1566986ac1d863d08486153a7035e4d0", "score": "0.5151365", "text": "func (v *Vault) Read(path string) map[string]interface{} {\n\tout := make(map[string]interface{})\n\n\ts, err := v.c.Logical().Read(path)\n\tif err != nil {\n\t\tfmt.Printf(\"Error reading secrets, err=%v\", err)\n\t\treturn nil\n\t}\n\n\t// Encode all k,v pairs\n\tif s == nil || s.Data == nil {\n\t\tfmt.Printf(\"No data to read at path, %s\\n\", path)\n\t\treturn out\n\t}\n\tfor k, v := range s.Data {\n\t\tswitch t := v.(type) {\n\t\tcase string:\n\t\t\tout[k] = base64.StdEncoding.EncodeToString([]byte(t))\n\t\tcase map[string]interface{}:\n\t\t\tif k == \"data\" {\n\t\t\t\tfor x, y := range t {\n\t\t\t\t\tif z, ok := y.(string); ok {\n\t\t\t\t\t\tout[x] = base64.StdEncoding.EncodeToString([]byte(z))\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\tdefault:\n\t\t\tfmt.Printf(\"error reading value at %s, key=%s, type=%T\\n\", path, k, v)\n\t\t}\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "83a5f8fc7ccefd6abae83a34fbf4d3cc", "score": "0.5147058", "text": "func (mstore *MemStore) Read(key string) ([]byte, error) {\n\tmstore.Lock()\n\tdefer mstore.Unlock()\n\tdata, ok := mstore.mem[key]\n\tif !ok {\n\t\treturn nil, fmt.Errorf(\"checkpoint is not found\")\n\t}\n\treturn data, nil\n}", "title": "" }, { "docid": "fd3623bac101675b91f1530e9aa5b086", "score": "0.5139721", "text": "func (kv *ShardKV) readPersist(data []byte) {\n\treadBuffer := bytes.NewBuffer(data)\n\tdecoder := gob.NewDecoder(readBuffer)\n\tdecoder.Decode(&kv.data)\n\tdecoder.Decode(&kv.marked)\n}", "title": "" }, { "docid": "a826f239d23ed830369b5b1c06625cb9", "score": "0.51344603", "text": "func (c *Client) Get(vb uint16, key string) (*transport.MCResponse, error) {\n\treturn c.Send(&transport.MCRequest{\n\t\tOpcode: transport.GET,\n\t\tVBucket: vb,\n\t\tKey: []byte(key),\n\t})\n}", "title": "" }, { "docid": "157bf943f1a0a171fc653501c04ea9cd", "score": "0.5132733", "text": "func (self *KVStorage) lookup(key string) (string, error) {\n\tself.mu.Lock()\n\tdefer self.mu.Unlock()\n\n\tvalue, present := self.state[key]\n\tif present {\n\treturn value, nil\n\t}\n\treturn \"\", fmt.Errorf(\"no key %s\", key)\n}", "title": "" }, { "docid": "89917a85b6d0c60d0970a61e6c640108", "score": "0.51309365", "text": "func (b *backend) pathKeysRead() *framework.Path {\n\treturn &framework.Path{\n\t\tPattern: fmt.Sprintf(\"keys/\" + framework.GenericNameRegex(\"role\")),\n\t\tHelpSynopsis: \"Provision a key for this role.\",\n\n\t\tFields: map[string]*framework.FieldSchema{\n\t\t\t\"role\": &framework.FieldSchema{\n\t\t\t\tType: framework.TypeString,\n\t\t\t\tDescription: \"Name of role.\",\n\t\t\t},\n\t\t\t\"ttl\": &framework.FieldSchema{\n\t\t\t\tType: framework.TypeDurationSecond,\n\t\t\t\tDescription: \"Lifetime of accessKey in seconds.\",\n\t\t\t},\n\t\t},\n\n\t\tCallbacks: map[logical.Operation]framework.OperationFunc{\n\t\t\tlogical.ReadOperation: b.pathKeyRead,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "fd02d75eece394685123dd3f1a2012c9", "score": "0.5129209", "text": "func (r qref) read(buf []byte) (*CacheEntry, error) {\n\tif !r.valid(buf) {\n\t\treturn nil, ErrCacheEntryCorrupted\n\t}\n\treturn &CacheEntry{\n\t\tTS: r.ts(buf),\n\t\tHash: r.hash(buf),\n\t\tKey: r.key(buf),\n\t\tData: r.data(buf), // could save 2 buffer reads here - beauty first\n\t}, nil\n}", "title": "" }, { "docid": "04697002e866d03adf3e0f2e31271cfc", "score": "0.5127963", "text": "func (c *Cache) Read(key string) (string, bool) {\n\tc.RLock()\n\tdefer c.RUnlock()\n\tvalue, ok := c.data[key]\n\treturn value, ok\n}", "title": "" }, { "docid": "6e3f74389936ff89084b96977f33dd24", "score": "0.5125382", "text": "func (user) read(b []byte) (int, error) {\n\ts := \"Test\"\n\treturn copy(b, s), nil\n}", "title": "" }, { "docid": "f697f4b2135ac318c53bdcc42dba994a", "score": "0.511738", "text": "func (s *Settings) Getv(key string) string {\n\treturn s.config[key]\n}", "title": "" }, { "docid": "6f7b07e9f80bd08c17a6f80f2d61fb3e", "score": "0.5108541", "text": "func (kv *DisKV) fileGet(shard int, key string) (string, error) {\n\tfullname := kv.shardDir(shard) + \"/key-\" + kv.encodeKey(key)\n\tcontent, err := ioutil.ReadFile(fullname)\n\treturn string(content), err\n}", "title": "" }, { "docid": "b0db3e51c60c9ec77ffda015eb1d348e", "score": "0.5107951", "text": "func ReadKey(key string) (string, error) {\n\tdata, err := ioutil.ReadFile(filepath.Join(SecretMountPath, key))\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\treturn string(data), nil\n}", "title": "" } ]
87df3cabe0fd5fd40bda8cd7f842751e
NewSamRTCHost creates a new default server
[ { "docid": "3bb7b92dc600638cee701c43627f1799", "score": "0.52206266", "text": "func NewSamRTCHost() (*SamRTCHost, error) {\n\treturn NewSamRTCHostFromOptions()\n}", "title": "" } ]
[ { "docid": "2d36b0788da002f29ce4d5cc396f751e", "score": "0.67803544", "text": "func newDefaultServer() server {\n\t// TODO: fix by only ever creating server in one place\n\thost, _ := os.Hostname()\n\n\treturn server{\n\t\tScmClass: scmDCPM,\n\t\tBdevClass: bdNVMe,\n\t\tHostname: host,\n\t\tNrXsHelpers: 2,\n\t}\n}", "title": "" }, { "docid": "b2af56e77ee0f68bc4f2c9549cad2a80", "score": "0.653057", "text": "func NewServer() *Server {}", "title": "" }, { "docid": "c238cb484cecb50eb7da24c9f456ba95", "score": "0.62099016", "text": "func CreateServer(p *int, h *string) {\n\troutes := mux.NewRouter().StrictSlash(true)\n\troutes.HandleFunc(\"/\"+*h, deployhook)\n\thttp.ListenAndServe(\":\"+strconv.Itoa(*p), routes)\n\tlog.Println(\"listening on {*p}\")\n}", "title": "" }, { "docid": "b0a47d9a33041ede6c55e11c0de28bc3", "score": "0.6199975", "text": "func newDefaultServer(listenAddrs []string, db database.Db) (*server, error) {\n\treturn newServer(listenAddrs, db, peer.Listen)\n}", "title": "" }, { "docid": "99f14210b02f6501987ade5922a68305", "score": "0.61221963", "text": "func NewServer() {\n\treturn\n}", "title": "" }, { "docid": "4eec982c18c779ed35126e98cd029af3", "score": "0.6120182", "text": "func TestNewServer(t *testing.T) {\n\t_ = makeServer()\n}", "title": "" }, { "docid": "bc9fc9f9c34b8b325442e1c756701d05", "score": "0.60347915", "text": "func NewCreateNameserverDefault(code int) *CreateNameserverDefault {\n\tif code <= 0 {\n\t\tcode = 500\n\t}\n\n\treturn &CreateNameserverDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "b1f147bc8c3bfffc26586b860d258d40", "score": "0.5977967", "text": "func createServer(IPv4 string, PortD string, ConnectionType string) *Server {\n\tserver := new(Server)\n\t//Sets the IPv4\n\tserver.IPv4 = IPv4\n\t//Sets the Port\n\tserver.PortD = PortD\n\t//Sets the connectionType\n\tserver.ConnectionType = ConnectionType\n\n\treturn server\n}", "title": "" }, { "docid": "ddb126dc4b8eb4a1b6680b4114b87b3f", "score": "0.59593767", "text": "func CreateServer(dim, red int, port string) *Server {\n\t// log.Level = logrus.DebugLevel\n\tserv := &Server{\n\t\tReg: CreateRegion(dim, red),\n\t\tC: &http.Client{},\n\t\tPort: port,\n\t}\n\treturn serv\n}", "title": "" }, { "docid": "b69cec5786b6bcf261a4d5cc6ce77419", "score": "0.5879586", "text": "func newServer() *Server {\n\treturn &Server{serviceMap: make(map[string]*service)}\n}", "title": "" }, { "docid": "1951b7637270dec3fa5be38eb3f8bdcf", "score": "0.58342767", "text": "func (c *ServerController) Create(serverName string, hostName string) {\n\tnginxRoot := getEnv(\"NGINX_ROOT\", \"/etc/nginx\")\n\tfmt.Printf(\"creating %s -> %s...\\n\", serverName, hostName)\n\tsitesAvailablePath := fmt.Sprintf(\"%s/sites-available/%s\", nginxRoot, serverName)\n\tsitesEnabledPath := fmt.Sprintf(\"%s/sites-enabled/%s\", nginxRoot, serverName)\n\tf, err := os.Create(sitesAvailablePath)\n\tcheckErr(err)\n\tf.Write([]byte(fmt.Sprintf(serverTemplate, serverName, hostName)))\n\tf.Sync()\n\tf.Close()\n\t_, err = exec.Command(\"ln\", \"-Fs\", sitesAvailablePath, sitesEnabledPath).Output()\n\tcheckErr(err)\n}", "title": "" }, { "docid": "e74bda09150ae351558479c66e013018", "score": "0.58071774", "text": "func (d *Driver) Create() error {\n\tm, err := dcGroups(d.client(), d.Location)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed pulling groups in location %v - %v\", d.Location, err)\n\t}\n\n\tgid, ok := m[d.GroupName]\n\tif !ok {\n\t\treturn fmt.Errorf(\"Failed resolving group %v\", d.GroupName)\n\t}\n\tlog.Debugf(\"Spawning server into group: %v\", gid)\n\tspec := server.Server{\n\t\tName: d.NameTemplate,\n\t\tPassword: d.SSHPassword,\n\t\tDescription: d.Description,\n\t\tGroupID: gid,\n\t\tCPU: d.CPU,\n\t\tMemoryGB: d.MemoryGB,\n\t\tSourceServerID: d.Template,\n\t\tType: d.ServerType,\n\t}\n\t//spec.Additionaldisks = disks\n\t//spec.Customfields = fields\n\tif d.AntiAffinityPolicy != \"\" {\n\t\tpolicyID, err := getAntiAffinityPolicyID(d.AntiAffinityPolicy)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Error querying anti-affinity policies: %v\", err)\n\t\t}\n\t\tspec.AntiAffinityPolicyID = policyID\n\t}\n\tif d.ServerType == serverTypeStandardBaremetal {\n\t\tspec.ConfigurationID = d.BareMetalDetail.SkuID\n\t\tspec.OSType = d.BareMetalDetail.OSType\n\t}\n\n\tlog.Debugf(\"Spawning server with: %v\", spec)\n\tresp, err := d.client().Server.Create(spec)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Error creating server: %v\", err)\n\t}\n\n\tok, st := resp.GetStatusID()\n\tif !ok {\n\t\treturn fmt.Errorf(\"Failed extracting status to poll on %v: %v\", resp, err)\n\t}\n\terr = waitStatus(d.client(), st)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed polling status: %v\", err)\n\t}\n\n\t_, uuid := resp.Links.GetID(\"self\")\n\ts, err := d.client().Server.Get(uuid)\n\td.ServerID = s.ID\n\tlog.Infof(\"Created server: %v\", d.ServerID)\n\n\t// add ssh pubkey\n\tif err := ssh.GenerateSSHKey(d.GetSSHKeyPath()); err != nil {\n\t\treturn err\n\t}\n\tpath := fmt.Sprintf(\"%v.pub\", d.GetSSHKeyPath())\n\tpubkey, err := ioutil.ReadFile(path)\n\tif err != nil {\n\t\treturn err\n\t}\n\tpkg := server.Package{\n\t\tID: defaultSSHKeyPackage,\n\t\tParams: map[string]string{\n\t\t\t\"User\": d.SSHUser,\n\t\t\t\"SshKey\": string(pubkey),\n\t\t},\n\t}\n\tpresp, err := d.client().Server.ExecutePackage(pkg, d.ServerID)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed exec'ing pubkey package on %v - %v\", d.ServerID, err)\n\t}\n\tok, st = presp[0].GetStatusID()\n\terr = waitStatus(d.client(), st)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"Failed installing pubkey on %v - %v\", d.ServerID, err)\n\t}\n\tlog.Infof(\"SSH Pubkey installed from %v for user %v\", path, d.SSHUser)\n\n\t// allocate IP and open ports\n\tif d.Public {\n\t\tinternal, err := d.detectIP()\n\t\tpip := server.PublicIP{\n\t\t\tInternalIP: internal,\n\t\t\tPorts: []server.Port{\n\t\t\t\tserver.Port{\n\t\t\t\t\tProtocol: \"tcp\",\n\t\t\t\t\tPort: d.SSHPort,\n\t\t\t\t},\n\t\t\t\tserver.Port{\n\t\t\t\t\tProtocol: \"tcp\",\n\t\t\t\t\tPort: d.DockerPort,\n\t\t\t\t},\n\t\t\t\tserver.Port{\n\t\t\t\t\tProtocol: \"tcp\",\n\t\t\t\t\tPort: d.DockerSwarmMasterPort,\n\t\t\t\t},\n\t\t\t},\n\t\t}\n\t\tresp, err := d.client().Server.AddPublicIP(s.ID, pip)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed adding public ip to %v - %v\", s.ID, err)\n\t\t}\n\t\terr = waitStatus(d.client(), resp.ID)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed while polling public ip %v - %v\", s.ID, err)\n\t\t}\n\n\t\t// scan NICs for any public ip\n\t\ts, err = d.client().Server.Get(s.ID)\n\t\tip, err := d.detectIP()\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"Failed detecting public ip on %v - %v\", d.ServerID, err)\n\t\t}\n\t\td.PublicIP = ip\n\t\tlog.Infof(\"Added public IP %v to %v\", d.PublicIP, d.ServerID)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a01016a07444a220f36774499622965e", "score": "0.579179", "text": "func (t *SrlNokiaSystem_System_Ntp) NewServer(Address string) (*SrlNokiaSystem_System_Ntp_Server, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*SrlNokiaSystem_System_Ntp_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &SrlNokiaSystem_System_Ntp_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "1f13f3ab93ea48ac230ecb82d4837250", "score": "0.57627267", "text": "func NewServer(opts ...ServerOpt) Server { return newServerImpl(opts...) }", "title": "" }, { "docid": "e58ae4e106315a7238b0ad2b71b0e7da", "score": "0.5759679", "text": "func TestNew(t *testing.T) {\n\tNew(\"nanobox-server\", \"nanobox\", \"server\")\n\tNew(\"nanobox-server\")\n\tinitSystem = \"\"\n\tNew(\"nanobox-server\", \"nanobox\", \"server\")\n}", "title": "" }, { "docid": "85645a1b9822f013cab8582386cb55d7", "score": "0.5752779", "text": "func NewDefaultServer(defaultServer string, includeExit bool) {\n\ts := NewServer(\"\")\n\thandlers := map[string]http.HandlerFunc{\"\": func(w http.ResponseWriter, r *http.Request) { http.Redirect(w, r, defaultServer, http.StatusFound) }, \"favicon.ico\": func(w http.ResponseWriter, r *http.Request) { http.NotFound(w, r) }}\n\n\tif includeExit {\n\t\thandlers[\"exit\"] = func(w http.ResponseWriter, r *http.Request) {\n\t\t\ts.Data.Append(\"shutdowns\", []byte(r.RemoteAddr+\" on \"+time.Now().UTC().Format(time.RFC1123)+\"\\n\"))\n\t\t\tos.Exit(0)\n\t\t}\n\t}\n\ts.AddHandlers(handlers)\n}", "title": "" }, { "docid": "7a7f6a0a2f24c62c646bba9a9e198f68", "score": "0.57411885", "text": "func CreateServer(i int, s abstract.Scalar) (server Server, err error) {\n\tif i < 0 {\n\t\treturn Server{}, fmt.Errorf(\"Invalid parameters\")\n\t}\n\tif s == nil {\n\t\ts = suite.Scalar().Pick(random.Stream)\n\t}\n\treturn Server{index: i, private: s, r: nil}, nil\n}", "title": "" }, { "docid": "05d186d8a4523dc7efa2aead44775dc0", "score": "0.5700396", "text": "func NewServer() Server {\n server := Server {\n Port: model.GetPort(),\n }\n\n // Main pages\n http.HandleFunc(\"/\", server.ShowIndexPage)\n http.HandleFunc(\"/index\", server.ShowIndexPage)\n http.HandleFunc(\"/contato\", server.ShowContactPage)\n http.HandleFunc(\"/suporte\", server.ShowSupportPage)\n http.HandleFunc(\"/blog\", server.DisplayBlog)\n http.HandleFunc(\"/blog/post\", server.DisplayPost)\n \thttp.HandleFunc(\"/api/posts\", server.GivePosts)\n\n return server\n}", "title": "" }, { "docid": "1b92fdee775374e1f44813cc1b2a9ea1", "score": "0.5691265", "text": "func New(stype string) (Server, error) {\n\tstype = strings.ToLower(stype)\n\tstype = strings.TrimSpace(stype)\n\n\tswitch stype {\n\tcase \"\", \"simple\":\n\t\treturn new(SimpleServer), nil\n\tcase \"sequence\":\n\t\treturn new(SequenceServer), nil\n\tcase \"stream\":\n\t\treturn new(StreamServer), nil\n\tcase \"actor\":\n\t\treturn new(ActorServer), nil\n\tcase \"locker\":\n\t\treturn new(LockerServer), nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unknown stype '%s' use simple, sequence, actor, or locker\", stype)\n\t}\n}", "title": "" }, { "docid": "b22bd0f6978e9aaa50db917dde7a6338", "score": "0.5667235", "text": "func newServer(dc string, nid string, elements []string, nrpc *proto.NatsRPC, getNodes func() map[string]discovery.Node) *Server {\n\treturn &Server{\n\t\tdc: dc,\n\t\tnid: nid,\n\t\tnrpc: nrpc,\n\t\telements: elements,\n\t\tislb: proto.ISLB(dc),\n\t\tgetNodes: getNodes,\n\t\trooms: make(map[proto.SID]*room),\n\t\tclosed: make(chan bool),\n\t}\n}", "title": "" }, { "docid": "7a57f985292a12bee6e81a9de5df9e33", "score": "0.5666412", "text": "func (t *SrlNokiaSystem_System_Aaa_ServerGroup) NewServer(Address string) (*SrlNokiaSystem_System_Aaa_ServerGroup_Server, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*SrlNokiaSystem_System_Aaa_ServerGroup_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &SrlNokiaSystem_System_Aaa_ServerGroup_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "2218373956738673e5d15c4285e80d99", "score": "0.5646668", "text": "func New(address string) *server {\n\tlog.Println(\"Creating server with address\", address)\n\tserver := &server{\n\t\taddress: address,\n\t}\n\treturn server\n}", "title": "" }, { "docid": "f462b5b25f030b544770b4ab54f3fe72", "score": "0.5644607", "text": "func (vp *vultrProvider) createServer(options providers.CreateInstanceOptions) (string, error) {\n\t// Find SSH key ID\n\tvar sshid string\n\tif len(options.SSHKeyNames) > 0 {\n\t\tvar err error\n\t\tsshid, err = vp.findSSHKeyID(options.SSHKeyNames[0])\n\t\tif err != nil {\n\t\t\treturn \"\", maskAny(err)\n\t\t}\n\t}\n\t// Fetch SSH keys\n\tsshKeys, err := providers.FetchSSHKeys(options.SSHKeyGithubAccount)\n\tif err != nil {\n\t\treturn \"\", maskAny(err)\n\t}\n\n\t// Create cloud-config\n\t// user-data\n\tccOpts := options.NewCloudConfigOptions()\n\tccOpts.PrivateIPv4 = \"$private_ipv4\"\n\tccOpts.SshKeys = sshKeys\n\tuserData, err := templates.Render(cloudConfigTemplate, ccOpts)\n\tif err != nil {\n\t\treturn \"\", maskAny(err)\n\t}\n\n\tname := options.InstanceName\n\topts := &lib.ServerOptions{\n\t\tIPV6: true,\n\t\tPrivateNetworking: true,\n\t\tSSHKey: sshid,\n\t\tUserData: userData,\n\t}\n\tregionID, err := strconv.Atoi(options.RegionID)\n\tif err != nil {\n\t\treturn \"\", maskAny(err)\n\t}\n\tplanID, err := strconv.Atoi(options.TypeID)\n\tif err != nil {\n\t\treturn \"\", maskAny(err)\n\t}\n\tosID, err := strconv.Atoi(options.ImageID)\n\tif err != nil {\n\t\treturn \"\", maskAny(err)\n\t}\n\tserver, err := vp.client.CreateServer(name, regionID, planID, osID, opts)\n\tif err != nil {\n\t\tvp.Logger.Debugf(\"CreateServer failed: %#v\", err)\n\t\treturn \"\", maskAny(err)\n\t}\n\tvp.Logger.Infof(\"Created server %s %s\\n\", server.ID, server.Name)\n\n\treturn server.ID, nil\n}", "title": "" }, { "docid": "d59dbe3e4ffee92eb47c243c25991f24", "score": "0.5632019", "text": "func NewServer(readBuf, writeBuf int) ChatServer {\n return NewServerWithTimeout(readBuf, writeBuf, defTokenDeadline,\n defTokenCleanupDelay)\n}", "title": "" }, { "docid": "fb4809a4b759294328328abf3c1254a4", "score": "0.5615185", "text": "func (s Server) CreateOrUpdate(client MetalCloudClient) error {\n\tvar err error\n\tvar result *Server\n\terr = s.Validate()\n\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif s.ServerID != 0 {\n\t\tresult, err = client.ServerGet(s.ServerID, false)\n\t} else {\n\t\tresult, err = client.ServerGetByUUID(s.ServerUUID, false)\n\t}\n\n\tif err != nil {\n\t\t_, err = client.ServerCreate(s, false)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\t_, err = client.ServerEditComplete(result.ServerID, s)\n\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "4e5b1917df5f53d06e4ca66733d2bc4e", "score": "0.5606684", "text": "func New() server {\n\treturn server{}\n}", "title": "" }, { "docid": "17f434287dfc62eb9f0ce418fe465a21", "score": "0.5568419", "text": "func (t *System_Ntp) NewServer(Address string) (*System_Ntp_Server, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Ntp_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &System_Ntp_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "fc39d0934e060e7142f082cc107461e6", "score": "0.55662817", "text": "func OpenDefaultServer(c *run.Config) Server {\n\ts := OpenServer(c)\n\tif err := s.CreateDatabaseAndRetentionPolicy(\"db0\", newRetentionPolicySpec(\"rp0\", 1, 0), true); err != nil {\n\t\tpanic(err)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "328707e0f7160ee01ab9eef2dd4fe620", "score": "0.556331", "text": "func NewHostName() string {\n\treturn PrefixedRandomName(\"host\")\n}", "title": "" }, { "docid": "914d797e65ecc56e82c43ea866af3154", "score": "0.55186456", "text": "func (t *System_Aaa_ServerGroup) NewServer(Address string) (*System_Aaa_ServerGroup_Server, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Aaa_ServerGroup_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &System_Aaa_ServerGroup_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "994a55619f1f8e0b84beb38f644deade", "score": "0.55125666", "text": "func (t *OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Servers) NewServer(Address string) (*OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Servers_Server, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Servers_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Servers_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "994a55619f1f8e0b84beb38f644deade", "score": "0.55125666", "text": "func (t *OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Servers) NewServer(Address string) (*OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Servers_Server, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Servers_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &OpenconfigSystem_System_Aaa_ServerGroups_ServerGroup_Servers_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "460f7b579bffe0b5899ca441ff2d6fa5", "score": "0.55049753", "text": "func (t *OpenconfigSystem_System_Ntp_Servers) NewServer(Address string) (*OpenconfigSystem_System_Ntp_Servers_Server, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*OpenconfigSystem_System_Ntp_Servers_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &OpenconfigSystem_System_Ntp_Servers_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "460f7b579bffe0b5899ca441ff2d6fa5", "score": "0.55049753", "text": "func (t *OpenconfigSystem_System_Ntp_Servers) NewServer(Address string) (*OpenconfigSystem_System_Ntp_Servers_Server, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*OpenconfigSystem_System_Ntp_Servers_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &OpenconfigSystem_System_Ntp_Servers_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "aa78dae6eb3843770ec38c8a073f6ed2", "score": "0.54947615", "text": "func newTestServer() (*Server, string) {\n\tport := os.Getenv(\"TEST_HTTP_PORT\")\n\tif len(port) == 0 {\n\t\tport = \"8080\"\n\t}\n\tconfig := ServerConfig{ListenAddress: \":\" + port}\n\tserver, err := NewServer(&config)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn server, \"http://localhost:\" + port\n}", "title": "" }, { "docid": "70e8f278fac2326b8333aab7108fa1de", "score": "0.54742444", "text": "func resourceServerCreate(data *schema.ResourceData, provider interface{}) error {\n\tname := data.Get(resourceKeyServerName).(string)\n\tdescription := data.Get(resourceKeyServerDescription).(string)\n\tadminPassword := data.Get(resourceKeyServerAdminPassword).(string)\n\tnetworkDomainID := data.Get(resourceKeyServerNetworkDomainID).(string)\n\tprimaryDNS := data.Get(resourceKeyServerPrimaryDNS).(string)\n\tsecondaryDNS := data.Get(resourceKeyServerSecondaryDNS).(string)\n\tautoStart := data.Get(resourceKeyServerAutoStart).(bool)\n\n\tlog.Printf(\"Create server '%s' in network domain '%s' (description = '%s').\", name, networkDomainID, description)\n\n\tproviderState := provider.(*providerState)\n\tapiClient := providerState.Client()\n\n\tnetworkDomain, err := apiClient.GetNetworkDomain(networkDomainID)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif networkDomain == nil {\n\t\treturn fmt.Errorf(\"No network domain was found with Id '%s'.\", networkDomainID)\n\t}\n\n\tdataCenterID := networkDomain.DatacenterID\n\tlog.Printf(\"Server will be deployed in data centre '%s'.\", dataCenterID)\n\n\tdeploymentConfiguration := compute.ServerDeploymentConfiguration{\n\t\tName: name,\n\t\tDescription: description,\n\t\tAdministratorPassword: adminPassword,\n\t\tStart: autoStart,\n\t}\n\n\tpropertyHelper := propertyHelper(data)\n\n\t// Retrieve image details.\n\tosImageID := propertyHelper.GetOptionalString(resourceKeyServerOSImageID, false)\n\tosImageName := propertyHelper.GetOptionalString(resourceKeyServerOSImageName, false)\n\tcustomerImageID := propertyHelper.GetOptionalString(resourceKeyServerCustomerImageID, false)\n\tcustomerImageName := propertyHelper.GetOptionalString(resourceKeyServerCustomerImageName, false)\n\n\tvar (\n\t\tosImage *compute.OSImage\n\t\tcustomerImage *compute.CustomerImage\n\t)\n\tif osImageID != nil {\n\t\tlog.Printf(\"Looking up OS image '%s' by Id...\", *osImageID)\n\n\t\tosImage, err = apiClient.GetOSImage(*osImageID)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tlog.Printf(\"Server will be deployed from OS image named '%s' (Id = '%s').\", osImage.Name, osImage.ID)\n\t\tdata.Set(resourceKeyServerOSImageName, osImage.Name)\n\t} else if osImageName != nil {\n\t\tlog.Printf(\"Looking up OS image '%s' by name...\", *osImageName)\n\n\t\tosImage, err = apiClient.FindOSImage(*osImageName, dataCenterID)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif osImage == nil {\n\t\t\tlog.Printf(\"Warning - unable to find an OS image named '%s' in data centre '%s' (which is where the target network domain, '%s', is located).\", *osImageName, dataCenterID, networkDomainID)\n\n\t\t\treturn fmt.Errorf(\"Unable to find an OS image named '%s' in data centre '%s' (which is where the target network domain, '%s', is located).\", *osImageName, dataCenterID, networkDomainID)\n\t\t}\n\n\t\tlog.Printf(\"Server will be deployed from OS image named '%s' (Id = '%s').\", osImage.Name, osImage.ID)\n\t\tdata.Set(resourceKeyServerOSImageID, osImage.ID)\n\t} else if customerImageID != nil {\n\t\tlog.Printf(\"Looking up customer image '%s' by Id...\", *customerImageID)\n\n\t\tcustomerImage, err = apiClient.GetCustomerImage(*customerImageID)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tlog.Printf(\"Server will be deployed from customer image named '%s' (Id = '%s').\", customerImage.Name, customerImage.ID)\n\t\tdata.Set(resourceKeyServerOSImageName, osImage.Name)\n\t} else if customerImageName != nil {\n\t\tlog.Printf(\"Looking up customer image '%s' by name...\", *customerImageName)\n\n\t\tosImage, err = apiClient.FindOSImage(*customerImageName, dataCenterID)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif osImage == nil {\n\t\t\tlog.Printf(\"Warning - unable to find a customer image named '%s' in data centre '%s' (which is where the target network domain, '%s', is located).\", *customerImageName, dataCenterID, networkDomainID)\n\n\t\t\treturn fmt.Errorf(\"Unable to find a customer image named '%s' in data centre '%s' (which is where the target network domain, '%s', is located).\", *customerImageName, dataCenterID, networkDomainID)\n\t\t}\n\n\t\tlog.Printf(\"Server will be deployed from OS image named '%s' (Id = '%s').\", osImage.Name, osImage.ID)\n\t\tdata.Set(resourceKeyServerOSImageID, osImage.ID)\n\t}\n\n\tif osImage != nil {\n\t\terr = deploymentConfiguration.ApplyOSImage(osImage)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else if customerImage != nil {\n\t\terr = deploymentConfiguration.ApplyCustomerImage(customerImage)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t} else {\n\t\treturn fmt.Errorf(\"Must specify either os_image_id, os_image_name, customer_image_id, or customer_image_name.\")\n\t}\n\n\t// Memory and CPU\n\tmemoryGB := propertyHelper.GetOptionalInt(resourceKeyServerMemoryGB, false)\n\tif memoryGB != nil {\n\t\tdeploymentConfiguration.MemoryGB = *memoryGB\n\t} else {\n\t\tdata.Set(resourceKeyServerMemoryGB, deploymentConfiguration.MemoryGB)\n\t}\n\n\tcpuCount := propertyHelper.GetOptionalInt(resourceKeyServerCPUCount, false)\n\tif cpuCount != nil {\n\t\tdeploymentConfiguration.CPU.Count = *cpuCount\n\t} else {\n\t\tdata.Set(resourceKeyServerCPUCount, deploymentConfiguration.CPU.Count)\n\t}\n\n\tcpuCoreCount := propertyHelper.GetOptionalInt(resourceKeyServerCPUCoreCount, false)\n\tif cpuCoreCount != nil {\n\t\tdeploymentConfiguration.CPU.CoresPerSocket = *cpuCoreCount\n\t} else {\n\t\tdata.Set(resourceKeyServerCPUCoreCount, deploymentConfiguration.CPU.CoresPerSocket)\n\t}\n\n\tcpuSpeed := propertyHelper.GetOptionalString(resourceKeyServerCPUSpeed, false)\n\tif cpuSpeed != nil {\n\t\tdeploymentConfiguration.CPU.Speed = *cpuSpeed\n\t} else {\n\t\tdata.Set(resourceKeyServerCPUSpeed, deploymentConfiguration.CPU.Speed)\n\t}\n\n\t// Network\n\tprimaryVLANID := propertyHelper.GetOptionalString(resourceKeyServerPrimaryVLAN, false)\n\tprimaryIPv4Address := propertyHelper.GetOptionalString(resourceKeyServerPrimaryIPv4, false)\n\n\tdeploymentConfiguration.Network = compute.VirtualMachineNetwork{\n\t\tNetworkDomainID: networkDomainID,\n\t\tPrimaryAdapter: compute.VirtualMachineNetworkAdapter{\n\t\t\tVLANID: primaryVLANID,\n\t\t\tPrivateIPv4Address: primaryIPv4Address,\n\t\t},\n\t}\n\tdeploymentConfiguration.PrimaryDNS = primaryDNS\n\tdeploymentConfiguration.SecondaryDNS = secondaryDNS\n\n\tlog.Printf(\"Server deployment configuration: %+v\", deploymentConfiguration)\n\tlog.Printf(\"Server CPU deployment configuration: %+v\", deploymentConfiguration.CPU)\n\n\tserverID, err := apiClient.DeployServer(deploymentConfiguration)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdata.SetId(serverID)\n\n\tlog.Printf(\"Server '%s' is being provisioned...\", name)\n\n\tresource, err := apiClient.WaitForDeploy(compute.ResourceTypeServer, serverID, resourceCreateTimeoutServer)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\t// Capture additional properties that may only be available after deployment.\n\tserver := resource.(*compute.Server)\n\tcaptureServerNetworkConfiguration(server, data, false)\n\n\tdata.Partial(true)\n\n\tvar publicIPv4Address string\n\tpublicIPv4Address, err = findPublicIPv4Address(apiClient,\n\t\tnetworkDomainID,\n\t\t*server.Network.PrimaryAdapter.PrivateIPv4Address,\n\t)\n\tif err != nil {\n\t\treturn err\n\t}\n\tif !isEmpty(publicIPv4Address) {\n\t\tdata.Set(resourceKeyServerPublicIPv4, publicIPv4Address)\n\t} else {\n\t\tdata.Set(resourceKeyServerPublicIPv4, nil)\n\t}\n\n\tdata.SetPartial(resourceKeyServerPublicIPv4)\n\n\terr = applyServerTags(data, apiClient, providerState.Settings())\n\tif err != nil {\n\t\treturn err\n\t}\n\tdata.SetPartial(resourceKeyServerTag)\n\n\terr = createDisks(server.Disks, data, apiClient)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tdata.Partial(false)\n\n\treturn nil\n}", "title": "" }, { "docid": "45949cb161e216a3708f865b8519b8fe", "score": "0.5472238", "text": "func newServer(sc *ServerConfig, b backends.Backend) (*server, error) {\n\tserver := &server{\n\t\tbackend: b,\n\t\tclientPool: NewPool(sc.MaxClients),\n\t\tclosedListener: make(chan (bool), 1),\n\t\tlistenInterface: sc.ListenInterface,\n\t\tstate: ServerStateNew,\n\t}\n\tserver.setConfig(sc)\n\tserver.setTimeout(sc.Timeout)\n\tif err := server.configureSSL(); err != nil {\n\t\treturn server, err\n\t}\n\treturn server, nil\n}", "title": "" }, { "docid": "2a08b4510485c4182bb0cbf36b1db75e", "score": "0.5457845", "text": "func New(domain ms.IDomain) ms.IServer {\n\treturn server{\n\t\tILogger: domain.NewLogger(\"rest\"),\n\t\tdomain: domain,\n\t\tidGen: ms.NewIdGen(),\n\t}\n}", "title": "" }, { "docid": "b293ac742b09e26acc5dd258adcffbaf", "score": "0.5446213", "text": "func setupServer(a *app.App, c *structs.Config) {\n\tserver.Create(a, &server.Config{\n\t\tAddress: c.Address,\n\t})\n}", "title": "" }, { "docid": "516fd13da7119e5356fcd92accb403d9", "score": "0.5437146", "text": "func (s *Server) setServerDefault() {\n\tif len(s.Name) == 0 {\n\t\ts.Name = \"default-k8s-webhook-server\"\n\t}\n\tif s.registry == nil {\n\t\ts.registry = map[string]Webhook{}\n\t}\n\tif s.sMux == nil {\n\t\ts.sMux = http.DefaultServeMux\n\t}\n\tif s.Port <= 0 {\n\t\ts.Port = 443\n\t}\n\tif len(s.CertDir) == 0 {\n\t\ts.CertDir = path.Join(\"k8s-webhook-server\", \"cert\")\n\t}\n\tif s.DisableWebhookConfigInstaller == nil {\n\t\tdiwc := false\n\t\ts.DisableWebhookConfigInstaller = &diwc\n\t}\n\n\tif s.Client == nil {\n\t\tcfg, err := config.GetConfig()\n\t\tif err != nil {\n\t\t\ts.err = err\n\t\t\treturn\n\t\t}\n\t\ts.Client, err = client.New(cfg, client.Options{})\n\t\tif err != nil {\n\t\t\ts.err = err\n\t\t\treturn\n\t\t}\n\t}\n}", "title": "" }, { "docid": "b2536a56a6f80ba5c871935414868b66", "score": "0.541782", "text": "func configureServer(s *graceful.Server, scheme, addr string) {\n}", "title": "" }, { "docid": "b2536a56a6f80ba5c871935414868b66", "score": "0.541782", "text": "func configureServer(s *graceful.Server, scheme, addr string) {\n}", "title": "" }, { "docid": "b2536a56a6f80ba5c871935414868b66", "score": "0.541782", "text": "func configureServer(s *graceful.Server, scheme, addr string) {\n}", "title": "" }, { "docid": "b2536a56a6f80ba5c871935414868b66", "score": "0.541782", "text": "func configureServer(s *graceful.Server, scheme, addr string) {\n}", "title": "" }, { "docid": "b2536a56a6f80ba5c871935414868b66", "score": "0.541782", "text": "func configureServer(s *graceful.Server, scheme, addr string) {\n}", "title": "" }, { "docid": "7ca8be2cb9826db96d8cad44437fc3b6", "score": "0.53976154", "text": "func newServer(\n\ttitaniumDB *gorm.DB,\n\tmux *muxie.Mux,\n\tlogger *log.Logger,\n) (*server, error) {\n\treturn &server{\n\t\ttitaniumDB: titaniumDB,\n\t\tmux: mux,\n\t\tlogger: logger,\n\t}, nil\n}", "title": "" }, { "docid": "d48b89e8256caad1d2f6a1db63158e66", "score": "0.5395995", "text": "func CreateServer() *Server {\n\tout := Server{\n\t\tservs: map[string]organizations_server.Server{},\n\t\tservsURL: map[string]*uuid.UUID{},\n\t}\n\n\treturn &out\n}", "title": "" }, { "docid": "1034ec906092c0c735861ba8df1e34bd", "score": "0.5387645", "text": "func StartNewServer(bridgePort int, cnf *file.Tunnel, bridgeType string) {\n\tBridge = bridge.NewTunnel(bridgePort, RunList, bridgeType)\n\tif err := Bridge.StartTunnel(); err != nil {\n\t\tlg.Fatalln(\"服务端开启失败\", err)\n\t}\n\tif svr := NewMode(Bridge, cnf); svr != nil {\n\t\tRunList[cnf.Id] = svr\n\t\terr := reflect.ValueOf(svr).MethodByName(\"Start\").Call(nil)[0]\n\t\tif err.Interface() != nil {\n\t\t\tlg.Fatalln(err)\n\t\t}\n\t} else {\n\t\tlg.Fatalln(\"启动模式不正确\")\n\t}\n}", "title": "" }, { "docid": "523393c4f25808f0bba51413bc85fc7f", "score": "0.5384022", "text": "func createSite(w http.ResponseWriter, r *http.Request) {\n\n\tvar site Sites\n\tjsonDcode := json.NewDecoder(r.Body)\n\terr := jsonDcode.Decode(&site)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t//connect to nats\n\tnc, err := nats.Connect(NATSHost)\n\tfailOnError(err, \"Could not connect to NATS Streaming Server\")\n\tpayload := struct {\n\t\tUseremail string\n\t\tDomainname string\n\t\tSubscription string\n\t\tStatus string\n\t}{\n\t\tUseremail: site.Email,\n\t\tDomainname: site.Domain,\n\t\tSubscription: \"basic\",\n\t\tStatus: \"creating\",\n\t}\n\n\tnatsMsg, err := json.Marshal(payload)\n\tfailOnError(err, \"Failed to create Json message for NATS\")\n\n\tnc.Publish(\"createsite\", natsMsg)\n\tnc.Publish(\"createsubdomain\", natsMsg)\n\tfmt.Printf(\"Published event for %v \\n\", natsMsg)\n\tlog.Println(\"Published site creation event\")\n\n\t//resp, err := http.Get(\"http://localhost:1980/createsite/\" + site.Email + \"/\" + site.Domain)\n\t//if err != nil {\n\t//\tfmt.Println(err)\n\t//}\n\tresponse := new(SystemMessage)\n\tresponse.Code = site.Domain\n\tresponse.Message = \"success\"\n\n\t//w.Header().Set(\"Content-Type\", \"application/json\")\n\tjson.NewEncoder(w).Encode(*response)\n\treturn\n}", "title": "" }, { "docid": "59a936e4a70d702dfd189c3a42a2bea6", "score": "0.5379307", "text": "func NewDefaultServer(manager oauth2server.Manager) *Server {\r\n\treturn NewServer(NewConfig(), manager)\r\n}", "title": "" }, { "docid": "434958627499c1bd652d8c37af1f7c15", "score": "0.53785866", "text": "func CreateServer(w http.ResponseWriter, r *http.Request){\n w.Header().Set(\"Content-Type\", \"application/json\")\n\n //create an instance and get the input data\n var serv Server\n in, _ := ioutil.ReadAll(r.Body)\n json.Unmarshal(in, &serv)\n\n //save the server if the ID is not empty\n if serv.ID != \"\" {\n servers = append(servers, serv)\n out, _ := json.Marshal(serv)\n w.Write(out)\n log.Println(\"The server\", serv, \"has been created.\")\n }else {\n log.Println(\"Can't create the server. Don't accept empty ID.\")\n }\n}", "title": "" }, { "docid": "37f5b200285d4600531667da57cf221e", "score": "0.5365347", "text": "func (n *NameCom) CreateVanityNameserver(request *VanityNameserver) (*VanityNameserver, error) {\n\tendpoint := fmt.Sprintf(\"/v4/domains/%s/vanity_nameservers\", request.DomainName)\n\n\tpost := &bytes.Buffer{}\n\terr := json.NewEncoder(post).Encode(request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbody, err := n.post(endpoint, post)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tresp := &VanityNameserver{}\n\n\terr = json.NewDecoder(body).Decode(resp)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn resp, nil\n}", "title": "" }, { "docid": "45e069b83a2627ea9a389c6d8cf4704f", "score": "0.53604305", "text": "func main() {\n\tserverName := \"%s\"\n\n\tgoe.InitServer(serverName)\n}", "title": "" }, { "docid": "a08d3234a7d0f4d79216b6395556a420", "score": "0.53554964", "text": "func (t *SrlNokiaSystem_System_Aaa) NewServerGroup(Name string) (*SrlNokiaSystem_System_Aaa_ServerGroup, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.ServerGroup == nil {\n\t\tt.ServerGroup = make(map[string]*SrlNokiaSystem_System_Aaa_ServerGroup)\n\t}\n\n\tkey := Name\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.ServerGroup[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list ServerGroup\", key)\n\t}\n\n\tt.ServerGroup[key] = &SrlNokiaSystem_System_Aaa_ServerGroup{\n\t\tName: &Name,\n\t}\n\n\treturn t.ServerGroup[key], nil\n}", "title": "" }, { "docid": "fc44236f290ae08a4c3d774184af30a1", "score": "0.5354737", "text": "func (p *createParams) createVultrServer() (*database.Server, error) {\n\tcl := p.newVultrClient()\n\tdetail, err := cl.Instance.Create(context.Background(), &govultr.InstanceCreateReq{\n\t\tRegion: \"nrt\", //Japan\n\t\tPlan: \"vc2-1c-1gb\",\n\t\tOsID: 413, // Ubuntu\n\t\tHostname: \"sakura-bot\",\n\t\tEnableIPv6: govultr.BoolToBoolPtr(true),\n\t\tLabel: createParam.serverName,\n\t\tSSHKeys: []string{string(file.ReadAll(createParam.pubKeyPath))},\n\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tlogger.Info().Msgf(\"waiting for server to start\")\n\n\tif err := p.waitForVultrServerToStart(cl, detail.ID); err != nil {\n\t\tlogger.Fatal().Err(err).Msgf(\"failed to wait for server start\")\n\t}\n\n\tlogger.Info().Msgf(\"server started\")\n\n\tfor i := 0; i < createParam.ipCount; i++ {\n\t\tif _, err := cl.Instance.CreateIPv4(context.Background(), detail.ID, govultr.BoolToBoolPtr(false)); err != nil {\n\t\t\tlogger.Fatal().Err(err).Msgf(\"failed to create ipv4\")\n\t\t}\n\t}\n\n\tif err := cl.Instance.Reboot(context.Background(), detail.ID); err != nil {\n\t\tlogger.Fatal().Err(err).Msgf(\"failed to reboot server\")\n\t}\n\n\tif err := p.waitForVultrServerToStart(cl, detail.ID); err != nil {\n\t\tlogger.Fatal().Err(err).Msgf(\"failed to wait for server start\")\n\t}\n\n\treturn &database.Server{\n\t\tModel: nil,\n\t\tIP: detail.MainIP,\n\t\tServerType: database.ServerTypeVULTR,\n\t\tUserName: \"root\",\n\t\tSSHKeyPath: createParam.getSSHPrivateKeyPath(),\n\t\tTags: database.StringsToDBTags(createParam.tags),\n\t\tUUID: detail.ID,\n\t}, nil\n}", "title": "" }, { "docid": "054d5dd806cbdb8a8c16446be0fbdd6d", "score": "0.5350531", "text": "func NewServer() {\n\tfmt.Println(\"Withdrawals service\")\n}", "title": "" }, { "docid": "243d5b6ba35c7041d6d17ba09f23fac1", "score": "0.53503233", "text": "func newServer(s micro.Service, r router.Router) *srv {\n\t// NOTE: this will end up being QUIC transport once it gets stable\n\tt := grpc.NewTransport(transport.Addrs(Network))\n\tn := server.NewServer(server.Transport(t))\n\n\treturn &srv{\n\t\trouter: r,\n\t\tnetwork: n,\n\t}\n}", "title": "" }, { "docid": "243d5b6ba35c7041d6d17ba09f23fac1", "score": "0.53503233", "text": "func newServer(s micro.Service, r router.Router) *srv {\n\t// NOTE: this will end up being QUIC transport once it gets stable\n\tt := grpc.NewTransport(transport.Addrs(Network))\n\tn := server.NewServer(server.Transport(t))\n\n\treturn &srv{\n\t\trouter: r,\n\t\tnetwork: n,\n\t}\n}", "title": "" }, { "docid": "762975562b5bdf80365636c9522abd01", "score": "0.5347543", "text": "func (serv ServerCreateInput) CreateServer() (ServerCreateResponse, error) {\n\n\tif status := support.DoesCloudSupports(strings.ToLower(serv.Cloud.Name)); status != true {\n\t\treturn ServerCreateResponse{}, fmt.Errorf(common.DefaultCloudResponse + \"GetNetworks\")\n\t}\n\tswitch strings.ToLower(serv.Cloud.Name) {\n\tcase \"aws\":\n\n\t\tsess := (serv.Cloud.Client).(*session.Session)\n\n\t\t//authorizing to request further\n\t\tauthInpt := auth.EstablishConnectionInput{Region: serv.Cloud.Region, Resource: \"ec2\", Session: sess}\n\n\t\t// I will call CreateServer of interface and get the things done\n\n\t\tserverin := awsserver.CreateServerInput{}\n\t\tserverin.InstanceName = serv.InstanceName\n\t\tserverin.ImageId = serv.ImageId\n\t\tserverin.InstanceType = serv.Flavor\n\t\tserverin.KeyName = serv.KeyName\n\t\tserverin.MaxCount = serv.Count\n\t\tserverin.SubnetId = serv.SubnetId\n\t\tserverin.UserData = serv.UserData\n\t\tserverin.AssignPubIp = serv.AssignPubIp\n\t\tserverin.GetRaw = serv.Cloud.GetRaw\n\t\tresponse, err := serverin.CreateServer(authInpt)\n\t\tif err != nil {\n\t\t\treturn ServerCreateResponse{}, err\n\t\t}\n\t\treturn ServerCreateResponse{AwsResponse: response}, nil\n\n\tcase \"azure\":\n\t\treturn ServerCreateResponse{}, fmt.Errorf(common.DefaultAzResponse)\n\tcase \"gcp\":\n\t\treturn ServerCreateResponse{}, fmt.Errorf(common.DefaultGcpResponse)\n\tcase \"openstack\":\n\t\treturn ServerCreateResponse{}, fmt.Errorf(common.DefaultOpResponse)\n\tdefault:\n\n\t\treturn ServerCreateResponse{}, fmt.Errorf(common.DefaultCloudResponse + \"CreateServer\")\n\t}\n}", "title": "" }, { "docid": "7f8f1a6ce96eb9bc8fb4ad18faa5d917", "score": "0.53446937", "text": "func (t *OpenconfigSystem_System_Dns_Servers) NewServer(Address string) (*OpenconfigSystem_System_Dns_Servers_Server, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*OpenconfigSystem_System_Dns_Servers_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &OpenconfigSystem_System_Dns_Servers_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "7f8f1a6ce96eb9bc8fb4ad18faa5d917", "score": "0.53446937", "text": "func (t *OpenconfigSystem_System_Dns_Servers) NewServer(Address string) (*OpenconfigSystem_System_Dns_Servers_Server, error){\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*OpenconfigSystem_System_Dns_Servers_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &OpenconfigSystem_System_Dns_Servers_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "916fc342f808bae8b54f0fbe206d3345", "score": "0.53392124", "text": "func (c completedConfig) New() (*CreatorServer, error) {\n\tgenericServer, err := c.GenericConfig.New(\"creator-apiserver\", genericapiserver.NewEmptyDelegate())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\ts := &CreatorServer{\n\t\tGenericAPIServer: genericServer,\n\t}\n\n\thandler, err := creator.NewHandler(c.ExtraConfig)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tapiGroupInfo := genericapiserver.NewDefaultAPIGroupInfo(apis_creator.GroupName, Scheme, metav1.ParameterCodec, Codecs)\n\n\tv1Storage := map[string]rest.Storage{}\n\tv1Storage[\"services\"] = &creatorrest.REST{\n\t\tLogger: c.ExtraConfig.Logger,\n\t\tHandler: handler,\n\t}\n\tapiGroupInfo.VersionedResourcesStorageMap[\"v1\"] = v1Storage\n\n\tif err := s.GenericAPIServer.InstallAPIGroup(&apiGroupInfo); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "32e9d2dab7746f31325212444a304f4f", "score": "0.533317", "text": "func createServer(restPort int) *Server {\n\tapiServer := echo.New()\n\tapiServer.Use(middleware.Recover())\n\tapiServer.Pre(middleware.RemoveTrailingSlash())\n\tapiServer.GET(\"/health\", healthCheck)\n\n\t// connect db\n\tdbConn := mongo.NewStorage(\"mongodb://localhost:27017\", \"gamesdb\", \"games\")\n\n\treturn &Server{\n\t\tport: restPort,\n\t\techoServer: apiServer,\n\t\tdb : dbConn,\n\t}\n}", "title": "" }, { "docid": "9fa4c1533d3c340559c348d6e64fcc47", "score": "0.5331922", "text": "func createServer(name string) *upcloud.ServerDetails {\n\ttitle := \"uploud-go-sdk-integration-test-\" + name\n\thostname := strings.ToLower(title + \".example.com\")\n\n\tcreateServerRequest := request.CreateServerRequest{\n\t\tZone: \"fi-hel1\",\n\t\tTitle: title,\n\t\tHostname: hostname,\n\t\tPasswordDelivery: request.PasswordDeliveryNone,\n\t\tStorageDevices: []upcloud.CreateServerStorageDevice{\n\t\t\t{\n\t\t\t\tAction: upcloud.CreateServerStorageDeviceActionClone,\n\t\t\t\tStorage: \"01000000-0000-4000-8000-000030060200\",\n\t\t\t\tTitle: \"disk1\",\n\t\t\t\tSize: 30,\n\t\t\t\tTier: upcloud.StorageTierMaxIOPS,\n\t\t\t},\n\t\t},\n\t\tIPAddresses: []request.CreateServerIPAddress{\n\t\t\t{\n\t\t\t\tAccess: upcloud.IPAddressAccessPrivate,\n\t\t\t\tFamily: upcloud.IPAddressFamilyIPv4,\n\t\t\t},\n\t\t\t{\n\t\t\t\tAccess: upcloud.IPAddressAccessPublic,\n\t\t\t\tFamily: upcloud.IPAddressFamilyIPv4,\n\t\t\t},\n\t\t\t{\n\t\t\t\tAccess: upcloud.IPAddressAccessPublic,\n\t\t\t\tFamily: upcloud.IPAddressFamilyIPv6,\n\t\t\t},\n\t\t},\n\t}\n\n\t// Create the server and block until it has started\n\tserverDetails, err := svc.CreateServer(&createServerRequest)\n\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Wait for the server to start\n\tserverDetails, err = svc.WaitForServerState(&request.WaitForServerStateRequest{\n\t\tUUID: serverDetails.UUID,\n\t\tDesiredState: upcloud.ServerStateStarted,\n\t\tTimeout: time.Minute * 5,\n\t})\n\n\thandleError(err)\n\n\treturn serverDetails\n}", "title": "" }, { "docid": "cd68c6746a1e274d3ab50797e70a20c0", "score": "0.5330921", "text": "func (c *Client) ServerCreate(server Server, autoGenerate bool) (int, error) {\n\n\tvar createdObject int\n\n\terr := c.rpcClient.CallFor(\n\t\t&createdObject,\n\t\t\"server_create\",\n\t\tserver,\n\t\tautoGenerate,\n\t)\n\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\n\treturn createdObject, nil\n}", "title": "" }, { "docid": "8016ed517863e9d82b65525d214e6cdd", "score": "0.53292865", "text": "func ExampleServersClient_BeginCreate_createANewServer() {\n\tcred, err := azidentity.NewDefaultAzureCredential(nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to obtain a credential: %v\", err)\n\t}\n\tctx := context.Background()\n\tclientFactory, err := armpostgresqlflexibleservers.NewClientFactory(\"<subscription-id>\", cred, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to create client: %v\", err)\n\t}\n\tpoller, err := clientFactory.NewServersClient().BeginCreate(ctx, \"testrg\", \"pgtestsvc4\", armpostgresqlflexibleservers.Server{\n\t\tLocation: to.Ptr(\"westus\"),\n\t\tTags: map[string]*string{\n\t\t\t\"ElasticServer\": to.Ptr(\"1\"),\n\t\t},\n\t\tProperties: &armpostgresqlflexibleservers.ServerProperties{\n\t\t\tAdministratorLogin: to.Ptr(\"cloudsa\"),\n\t\t\tAdministratorLoginPassword: to.Ptr(\"password\"),\n\t\t\tAvailabilityZone: to.Ptr(\"1\"),\n\t\t\tBackup: &armpostgresqlflexibleservers.Backup{\n\t\t\t\tBackupRetentionDays: to.Ptr[int32](7),\n\t\t\t\tGeoRedundantBackup: to.Ptr(armpostgresqlflexibleservers.GeoRedundantBackupEnumDisabled),\n\t\t\t},\n\t\t\tCreateMode: to.Ptr(armpostgresqlflexibleservers.CreateModeCreate),\n\t\t\tHighAvailability: &armpostgresqlflexibleservers.HighAvailability{\n\t\t\t\tMode: to.Ptr(armpostgresqlflexibleservers.HighAvailabilityModeZoneRedundant),\n\t\t\t},\n\t\t\tNetwork: &armpostgresqlflexibleservers.Network{\n\t\t\t\tDelegatedSubnetResourceID: to.Ptr(\"/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/test-vnet-subnet\"),\n\t\t\t\tPrivateDNSZoneArmResourceID: to.Ptr(\"/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourcegroups/testrg/providers/Microsoft.Network/privateDnsZones/test-private-dns-zone.postgres.database.azure.com\"),\n\t\t\t},\n\t\t\tStorage: &armpostgresqlflexibleservers.Storage{\n\t\t\t\tAutoGrow: to.Ptr(armpostgresqlflexibleservers.StorageAutoGrowDisabled),\n\t\t\t\tIopsTier: to.Ptr(armpostgresqlflexibleservers.AzureManagedDiskPerformanceTiersP20),\n\t\t\t\tStorageSizeGB: to.Ptr[int32](512),\n\t\t\t},\n\t\t\tVersion: to.Ptr(armpostgresqlflexibleservers.ServerVersionTwelve),\n\t\t},\n\t\tSKU: &armpostgresqlflexibleservers.SKU{\n\t\t\tName: to.Ptr(\"Standard_D4s_v3\"),\n\t\t\tTier: to.Ptr(armpostgresqlflexibleservers.SKUTierGeneralPurpose),\n\t\t},\n\t}, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to finish the request: %v\", err)\n\t}\n\tres, err := poller.PollUntilDone(ctx, nil)\n\tif err != nil {\n\t\tlog.Fatalf(\"failed to pull the result: %v\", err)\n\t}\n\t// You could use response here. We use blank identifier for just demo purposes.\n\t_ = res\n\t// If the HTTP response code is 200 as defined in example definition, your response structure would look as follows. Please pay attention that all the values in the output are fake values for just demo purposes.\n\t// res.Server = armpostgresqlflexibleservers.Server{\n\t// \tName: to.Ptr(\"pgtestsvc4\"),\n\t// \tType: to.Ptr(\"Microsoft.DBforPostgreSQL/flexibleServers\"),\n\t// \tID: to.Ptr(\"/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.DBforPostgreSQL/flexibleServers/pgtestsvc4\"),\n\t// \tLocation: to.Ptr(\"westus\"),\n\t// \tTags: map[string]*string{\n\t// \t\t\"ElasticServer\": to.Ptr(\"1\"),\n\t// \t},\n\t// \tProperties: &armpostgresqlflexibleservers.ServerProperties{\n\t// \t\tAdministratorLogin: to.Ptr(\"cloudsa\"),\n\t// \t\tAuthConfig: &armpostgresqlflexibleservers.AuthConfig{\n\t// \t\t\tActiveDirectoryAuth: to.Ptr(armpostgresqlflexibleservers.ActiveDirectoryAuthEnumDisabled),\n\t// \t\t\tPasswordAuth: to.Ptr(armpostgresqlflexibleservers.PasswordAuthEnumEnabled),\n\t// \t\t},\n\t// \t\tAvailabilityZone: to.Ptr(\"1\"),\n\t// \t\tBackup: &armpostgresqlflexibleservers.Backup{\n\t// \t\t\tBackupRetentionDays: to.Ptr[int32](7),\n\t// \t\t\tEarliestRestoreDate: to.Ptr(func() time.Time { t, _ := time.Parse(time.RFC3339Nano, \"2021-05-26T01:08:06.7197478+00:00\"); return t}()),\n\t// \t\t\tGeoRedundantBackup: to.Ptr(armpostgresqlflexibleservers.GeoRedundantBackupEnumDisabled),\n\t// \t\t},\n\t// \t\tDataEncryption: &armpostgresqlflexibleservers.DataEncryption{\n\t// \t\t\tType: to.Ptr(armpostgresqlflexibleservers.ArmServerKeyTypeSystemManaged),\n\t// \t\t},\n\t// \t\tFullyQualifiedDomainName: to.Ptr(\"c7d7483a8ceb.test-private-dns-zone.postgres.database.azure.com\"),\n\t// \t\tHighAvailability: &armpostgresqlflexibleservers.HighAvailability{\n\t// \t\t\tMode: to.Ptr(armpostgresqlflexibleservers.HighAvailabilityModeZoneRedundant),\n\t// \t\t\tStandbyAvailabilityZone: to.Ptr(\"2\"),\n\t// \t\t\tState: to.Ptr(armpostgresqlflexibleservers.ServerHAStateHealthy),\n\t// \t\t},\n\t// \t\tMaintenanceWindow: &armpostgresqlflexibleservers.MaintenanceWindow{\n\t// \t\t\tCustomWindow: to.Ptr(\"Disabled\"),\n\t// \t\t\tDayOfWeek: to.Ptr[int32](0),\n\t// \t\t\tStartHour: to.Ptr[int32](0),\n\t// \t\t\tStartMinute: to.Ptr[int32](0),\n\t// \t\t},\n\t// \t\tMinorVersion: to.Ptr(\"6\"),\n\t// \t\tNetwork: &armpostgresqlflexibleservers.Network{\n\t// \t\t\tDelegatedSubnetResourceID: to.Ptr(\"/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.Network/virtualNetworks/test-vnet/subnets/test-vnet-subnet\"),\n\t// \t\t\tPrivateDNSZoneArmResourceID: to.Ptr(\"/subscriptions/ffffffff-ffff-ffff-ffff-ffffffffffff/resourceGroups/testrg/providers/Microsoft.Network/privateDnsZones/test-private-dns-zone.postgres.database.azure.com\"),\n\t// \t\t\tPublicNetworkAccess: to.Ptr(armpostgresqlflexibleservers.ServerPublicNetworkAccessStateDisabled),\n\t// \t\t},\n\t// \t\tState: to.Ptr(armpostgresqlflexibleservers.ServerStateReady),\n\t// \t\tStorage: &armpostgresqlflexibleservers.Storage{\n\t// \t\t\tAutoGrow: to.Ptr(armpostgresqlflexibleservers.StorageAutoGrowDisabled),\n\t// \t\t\tIops: to.Ptr[int32](2300),\n\t// \t\t\tIopsTier: to.Ptr(armpostgresqlflexibleservers.AzureManagedDiskPerformanceTiersP20),\n\t// \t\t\tStorageSizeGB: to.Ptr[int32](512),\n\t// \t\t},\n\t// \t\tVersion: to.Ptr(armpostgresqlflexibleservers.ServerVersionTwelve),\n\t// \t},\n\t// \tSKU: &armpostgresqlflexibleservers.SKU{\n\t// \t\tName: to.Ptr(\"Standard_D4s_v3\"),\n\t// \t\tTier: to.Ptr(armpostgresqlflexibleservers.SKUTierGeneralPurpose),\n\t// \t},\n\t// }\n}", "title": "" }, { "docid": "a75e608e52f5e165c809e2039853e1eb", "score": "0.5326463", "text": "func New(addr string, port int) *Server {\n\ts := &Server{\n\t\t//ch:\t\t\t\tmake(chan bool),\n\t\t//waitGroup:\t\t&sync.WaitGroup{},\n\t\taddr: addr,\n\t\tport: port,\n\t\t// config: config,\n\t}\n\treturn s\n}", "title": "" }, { "docid": "16620797134ad1bcda3cd71aee51839f", "score": "0.53235096", "text": "func create(low, high, wwwroot string) *Server {\r\n\r\n\ttlsConfig := &tls.Config{\r\n\t\tPreferServerCipherSuites: true,\r\n\t\tCurvePreferences: []tls.CurveID{\r\n\t\t\ttls.CurveP256,\r\n\t\t\ttls.X25519,\r\n\t\t},\r\n\t\tMinVersion: tls.VersionTLS12,\r\n\t\tCipherSuites: []uint16{\r\n\t\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_256_GCM_SHA384,\r\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_256_GCM_SHA384,\r\n\t\t\ttls.TLS_ECDHE_ECDSA_WITH_CHACHA20_POLY1305, // Go 1.8 only\r\n\t\t\ttls.TLS_ECDHE_RSA_WITH_CHACHA20_POLY1305, // Go 1.8 only\r\n\t\t\ttls.TLS_ECDHE_ECDSA_WITH_AES_128_GCM_SHA256,\r\n\t\t\ttls.TLS_ECDHE_RSA_WITH_AES_128_GCM_SHA256,\r\n\t\t},\r\n\t\tCertificates: buildDebugCerts(),\r\n\t}\r\n\r\n\treturn &Server{\r\n\t\tlow: &http.Server{\r\n\t\t\tAddr: low,\r\n\t\t\tReadTimeout: 5 * time.Second,\r\n\t\t\tWriteTimeout: 5 * time.Second,\r\n\t\t\tHandler: http.HandlerFunc(func(w http.ResponseWriter, req *http.Request) {\r\n\t\t\t\tw.Header().Set(\"Connection\", \"close\")\r\n\t\t\t\turl := buildRedirect(high, req)\r\n\t\t\t\tlog.Printf(\"Redirecting to %s\", url)\r\n\t\t\t\thttp.Redirect(w, req, url, http.StatusMovedPermanently)\r\n\t\t\t}),\r\n\t\t},\r\n\t\thigh: &http.Server{\r\n\t\t\tAddr: high,\r\n\t\t\tReadTimeout: 15 * time.Second,\r\n\t\t\tWriteTimeout: 60 * time.Second,\r\n\t\t\tIdleTimeout: 120 * time.Second,\r\n\t\t\tTLSConfig: tlsConfig,\r\n\t\t\tHandler: handlers.CombinedLoggingHandler(os.Stdout, http.FileServer(http.Dir(wwwroot))),\r\n\t\t},\r\n\t}\r\n}", "title": "" }, { "docid": "ac3262247d12c77f43ef7372e4ed9e8f", "score": "0.53058875", "text": "func NewServer(addr string) *Server {\n\treturn &Server{\n\t\taddr: addr,\n\t\tentriesByName: make(map[string]entry),\n\t\tentriesByID: make(map[uint16]entry),\n\t}\n}", "title": "" }, { "docid": "e49e5ea9445b3828a3764ea1a9fc03b0", "score": "0.52932405", "text": "func New(path string, host string, port int) *Server {\n\ts := &Server{\n\t\thost: host,\n\t\tport: port,\n\t\tpath: path,\n\t\tdb: db.New(),\n\t\trouter: mux.NewRouter(),\n\t}\n\n\t// Read existing name or generate a new one.\n\tif b, err := ioutil.ReadFile(filepath.Join(path, \"name\")); err == nil {\n\t\ts.name = string(b)\n\t} else {\n\t\ts.name = fmt.Sprintf(\"%07x\", rand.Int())[0:7]\n\t\tif err = ioutil.WriteFile(filepath.Join(path, \"name\"), []byte(s.name), 0644); err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "526706689f432353d3a82202de805969", "score": "0.52903014", "text": "func NewServer() *cobra.Command {\n\tcommand := cobra.Command{\n\t\tUse: \"tablo\",\n\t\tShort: \"the one point of view to all your task boards\",\n\t\tLong: \"The one point of view to all your task boards.\",\n\n\t\tSilenceErrors: false,\n\t\tSilenceUsage: true,\n\n\t\tRunE: func(cmd *cobra.Command, args []string) error {\n\t\t\thandler := v1.NewTabloServiceServer(server.Tablo(), nil)\n\t\t\tmiddleware := cors.New(cors.Options{\n\t\t\t\tAllowedOrigins: []string{\"*\"},\n\t\t\t\tAllowedMethods: []string{\"GET\", \"POST\", \"PUT\", \"DELETE\", \"OPTIONS\"},\n\t\t\t\tAllowedHeaders: []string{\"Accept\", \"Authorization\", \"Content-Type\", \"X-CSRF-Token\"},\n\t\t\t\tExposedHeaders: []string{\"Link\"},\n\t\t\t\tAllowCredentials: true,\n\t\t\t\tMaxAge: 300,\n\t\t\t})\n\n\t\t\tmux := http.NewServeMux()\n\t\t\tmux.Handle(handler.PathPrefix(), middleware.Handler(handler))\n\n\t\t\treturn http.ListenAndServe(\":8080\", mux)\n\t\t},\n\t}\n\t/* configure instance */\n\tcommand.AddCommand( /* related commands */ )\n\treturn &command\n}", "title": "" }, { "docid": "54003751a84fd906c790179340709618", "score": "0.52890545", "text": "func New(opts *Options) *Server {\n\tprocessOptions(opts)\n\tinfo := Info{\n\t\tID: genID(),\n\t\tVersion: VERSION,\n\t\tHost: opts.Host,\n\t\tPort: opts.Port,\n\t\tAuthRequired: false,\n\t\tSslRequired: false,\n\t\tMaxPayload: MAX_PAYLOAD_SIZE,\n\t}\n\t// Check for Auth items\n\tif opts.Username != \"\" || opts.Authorization != \"\" {\n\t\tinfo.AuthRequired = true\n\t}\n\ts := &Server{\n\t\tinfo: info,\n\t\tsl: sublist.New(),\n\t\topts: opts,\n\t\tdebug: opts.Debug,\n\t\ttrace: opts.Trace,\n\t\tdone: make(chan bool, 1),\n\t\tstart: time.Now(),\n\t}\n\n\ts.mu.Lock()\n\tdefer s.mu.Unlock()\n\n\t// Setup logging with flags\n\ts.LogInit()\n\n\t// For tracking clients\n\ts.clients = make(map[uint64]*client)\n\n\t// For tracking routes and their remote ids\n\ts.routes = make(map[uint64]*client)\n\ts.remotes = make(map[string]*client)\n\n\t// Used to kick out all of the route\n\t// connect Go routines.\n\ts.rcQuit = make(chan bool)\n\n\t// Generate the info json\n\tb, err := json.Marshal(s.info)\n\tif err != nil {\n\t\tFatalf(\"Error marshalling INFO JSON: %+v\\n\", err)\n\t}\n\ts.infoJSON = []byte(fmt.Sprintf(\"INFO %s %s\", b, CR_LF))\n\n\ts.handleSignals()\n\n\tLogf(\"Starting gnatsd version %s\", VERSION)\n\n\ts.running = true\n\n\treturn s\n}", "title": "" }, { "docid": "6493bf81b65c5dd5dea1432bfacddb6c", "score": "0.5289003", "text": "func CreateDefaultGateway(r model.Route) {\n\targs := []string{\"route\", \"add\", \"default\", \"via\", r.InterfaceIP}\n\tcmdOut := ExecuteIPCommand(args)\n\tlog.Infof(cmdOut)\n\n}", "title": "" }, { "docid": "5c2de272ce20069513ad76701d8ade0a", "score": "0.52757865", "text": "func (f Factory) Create(cell, serverAddr, root string) (topo.Conn, error) {\n\treturn NewServer(serverAddr, root)\n}", "title": "" }, { "docid": "31a1134b4539b25e3f2260d82869bffc", "score": "0.5274417", "text": "func NewDefaultServer(addr address.Address) Server {\n\treturn NewServerFromError(addr, nil, nil)\n}", "title": "" }, { "docid": "2497999b0f2521e1321a13e59126845b", "score": "0.5273623", "text": "func (s *Server) Create(ctx context.Context, config *config.Config) error {\n\n\tvar pigeonClient pigeon.Client\n\n\tif err := pigeonClient.Init(config); err != nil {\n\t\treturn err\n\t}\n\n\ts.Pigeon = &pigeonClient\n\ts.Config = config\n\ts.Router = mux.NewRouter()\n\ts.HTTP = &http.Server{\n\t\tAddr: fmt.Sprintf(\":%s\", s.Config.Port),\n\t\tHandler: s.Router,\n\t}\n\n\ts.setupRoutes()\n\n\treturn nil\n}", "title": "" }, { "docid": "68436552300d581f70e6c1cbec60bce7", "score": "0.52719563", "text": "func (repository *ServerRepository) CreateServer(model *models.ServerModel) {\n\trepository.GetDB().Create(model)\n}", "title": "" }, { "docid": "eebeeed57fcfa3d4439881bde5ec6b52", "score": "0.5270254", "text": "func New() Server {\n\treturn Server{}\n}", "title": "" }, { "docid": "8e6c4ff792bb6f9a487257ce5857cea7", "score": "0.52598554", "text": "func NewServer() (*Server, error) {\n\t// Load existing config\n\tinitConfigContent, err := loadExistingConfigContent()\n\tif err != nil {\n\t\tlog.Errorf(\"Failed to load the existing configuration. Error: %v.\", err)\n\t\tinitConfigContent = nil\n\t}\n\n\t// Create the GNMI server.\n\tmodel := gnmi.NewModel(link022ModelData,\n\t\treflect.TypeOf((*ocstruct.Office)(nil)),\n\t\tocstruct.SchemaTree[\"Office\"],\n\t\tocstruct.Unmarshal,\n\t\tocstruct.ΛEnum)\n\n\ts, err := gnmi.NewServer(model,\n\t\tinitConfigContent,\n\t\thandleSet)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgnmiServer := &Server{s}\n\tlog.Info(\"GNMI server created.\")\n\treturn gnmiServer, nil\n}", "title": "" }, { "docid": "d4e7a1a0eece385b60daebe340234b10", "score": "0.52574164", "text": "func CallSequence_NewServer(s CallSequence_Server, policy *server.Policy) *server.Server {\n\tc, _ := s.(server.Shutdowner)\n\treturn server.New(CallSequence_Methods(nil, s), s, c, policy)\n}", "title": "" }, { "docid": "1c8f0b697031684ca5ee187f31f41fa6", "score": "0.5253561", "text": "func (s stack) rpcCreateServer(ctx context.Context, name string, networks []servers.Network, templateID, imageID string, diskSize int, userdata []byte, az string) (*servers.Server, fail.Error) {\n\tif name = strings.TrimSpace(name); name == \"\" {\n\t\treturn nil, fail.InvalidParameterCannotBeEmptyStringError(\"name\")\n\t}\n\tif templateID = strings.TrimSpace(templateID); templateID == \"\" {\n\t\treturn nil, fail.InvalidParameterCannotBeEmptyStringError(\"templateID\")\n\t}\n\tif imageID = strings.TrimSpace(imageID); imageID == \"\" {\n\t\treturn nil, fail.InvalidParameterCannotBeEmptyStringError(\"imageID\")\n\t}\n\tif az == \"\" {\n\t\treturn nil, fail.InvalidParameterCannotBeEmptyStringError(\"az\")\n\t}\n\n\tmetadata := make(map[string]string)\n\tmetadata[\"ManagedBy\"] = \"safescale\"\n\tmetadata[\"DeclaredInBucket\"] = s.cfgOpts.MetadataBucket\n\tmetadata[\"Image\"] = imageID\n\tmetadata[\"Template\"] = templateID\n\tmetadata[\"CreationDate\"] = time.Now().Format(time.RFC3339)\n\tmetadata[\"Revision\"] = lib.Revision\n\n\tsrvOpts := servers.CreateOpts{\n\t\tName: name,\n\t\tImageRef: imageID,\n\t\tFlavorRef: templateID,\n\t\tUserData: userdata,\n\t\tAvailabilityZone: az,\n\t\tNetworks: networks,\n\t\tMetadata: metadata,\n\t}\n\n\tbd := []bootfromvolume.BlockDevice{\n\t\t{\n\t\t\tUUID: srvOpts.ImageRef,\n\t\t\tSourceType: bootfromvolume.SourceImage,\n\t\t\tVolumeSize: diskSize,\n\t\t},\n\t}\n\n\tvar server *servers.Server\n\txerr := stacks.RetryableRemoteCall(ctx,\n\t\tfunc() error {\n\t\t\taserver, innerErr := bootfromvolume.Create(s.ComputeClient, bootfromvolume.CreateOptsExt{\n\t\t\t\tCreateOptsBuilder: srvOpts,\n\t\t\t\tBlockDevice: bd,\n\t\t\t}).Extract()\n\t\t\tif innerErr != nil {\n\t\t\t\treturn innerErr\n\t\t\t}\n\t\t\tserver = aserver\n\t\t\treturn nil\n\t\t},\n\t\tNormalizeError,\n\t)\n\tif xerr != nil {\n\t\treturn &servers.Server{}, xerr\n\t}\n\n\tif server == nil {\n\t\treturn nil, fail.NewError(\"invalid server\")\n\t}\n\tif server.ID == \"\" {\n\t\treturn nil, fail.NewError(\"invalid server\")\n\t}\n\n\treturn server, nil\n}", "title": "" }, { "docid": "a84ec1024db1563acade430c988dfeb4", "score": "0.5253438", "text": "func (t *System_Dns) NewServer(Address string) (*System_Dns_Server, error) {\n\n\t// Initialise the list within the receiver struct if it has not already been\n\t// created.\n\tif t.Server == nil {\n\t\tt.Server = make(map[string]*System_Dns_Server)\n\t}\n\n\tkey := Address\n\n\t// Ensure that this key has not already been used in the\n\t// list. Keyed YANG lists do not allow duplicate keys to\n\t// be created.\n\tif _, ok := t.Server[key]; ok {\n\t\treturn nil, fmt.Errorf(\"duplicate key %v for list Server\", key)\n\t}\n\n\tt.Server[key] = &System_Dns_Server{\n\t\tAddress: &Address,\n\t}\n\n\treturn t.Server[key], nil\n}", "title": "" }, { "docid": "595392a7187cedc217c2842e39eeb3b8", "score": "0.52460265", "text": "func PersistentUiView_NewServer(s PersistentUiView_Server, policy *server.Policy) *server.Server {\n\tc, _ := s.(server.Shutdowner)\n\treturn server.New(PersistentUiView_Methods(nil, s), s, c, policy)\n}", "title": "" }, { "docid": "d1c37d2246974adc588f3ae14c024540", "score": "0.52419406", "text": "func NewServer(back *back.Back, config *config.Config) (*Server, error) {\n\tbaseDir, err := getResourcesDir()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(config.CookieHashKey) != 32 {\n\t\treturn nil, errors.New(\"CookieHashKey must be 32 chars\")\n\t}\n\tif len(config.CookieBlockKey) != 32 {\n\t\treturn nil, errors.New(\"CookieBlockKey must be 32 chars\")\n\t}\n\tif config.Domain == \"\" {\n\t\treturn nil, errors.New(\"Domain must be set\") // nolint:stylecheck\n\t}\n\n\ts := &Server{\n\t\tconfig: config,\n\t\tback: back,\n\t\tlocales: map[string]*gotext.Locale{},\n\t\tstatsCache: cache2go.Cache(\"stats\"),\n\t\tsc: securecookie.New([]byte(config.CookieHashKey), []byte(config.CookieBlockKey)),\n\t\thttp: &http.Server{\n\t\t\tAddr: \"127.0.0.1:3001\",\n\t\t\tReadTimeout: 5 * time.Second,\n\t\t\tWriteTimeout: 5 * time.Second,\n\t\t\tIdleTimeout: 10 * time.Second,\n\t\t},\n\t}\n\n\tfor _, k := range availableLocales {\n\t\ts.locales[k] = gotext.NewLocale(filepath.Join(baseDir, \"locales\"), k)\n\t\ts.locales[k].AddDomain(\"default\")\n\t}\n\n\ts.http.Handler = s.setupRouter(baseDir)\n\ts.tpl, err = s.loadTemplates(baseDir)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn s, nil\n}", "title": "" }, { "docid": "51cedf4c7a0a509388ba7539c4572677", "score": "0.5233854", "text": "func NewServer(ip string, port int) *Server {\n\t//create an instance of Object \"Server\", assign the address of it to varibale \"server\", then return (a pointer to this Server object)\n\tserver := &Server{\n\t\tIp : ip,\n\t\tPort : port,\n\t}\n\n\treturn server\n}", "title": "" }, { "docid": "d552a5c21dbe52a34f648e754e1fda2e", "score": "0.52336216", "text": "func NewServer(addr string, sysControl *system.SysController, statsControl *system.StatsController, cfg *g.GlobalConfig) *Server {\n\tser := &Server{\n\t\taddr: addr,\n\t\tm: martini.Classic(),\n\t}\n\tauthFunc := mauth.BasicFunc(func(username, password string) bool {\n\t\tpwd, ok := cfg.Witch.Auth[username]\n\t\treturn ok && pwd == password\n\t}).(func(http.ResponseWriter, *http.Request, martini.Context))\n\tser.m.Map(sysControl)\n\tser.m.Map(statsControl)\n\tser.m.Use(authInclusive(\"/api\", authFunc))\n\tser.m.Use(render.Renderer(render.Options{}))\n\t// start|stop|restart RabbitMQ process(other process) via supervisor or systemd\n\tser.m.Put(\"/api/app/actions\", sysAction)\n\t// forced to stop RabbitMQ process(other process) via sent SIGTERM syscall signal\n\tser.m.Get(\"/api/app/fstop\", procForceStop)\n\t// get current RabbitMQ statistic db node location\n\tser.m.Get(\"/api/stats\", statsInfo)\n\t// reset|crash|terminate current RabbitMQ statistic db node\n\tser.m.Put(\"/api/stats/actions\", statsAction)\n\treturn ser\n}", "title": "" }, { "docid": "9afd4c64fc315b0e7f09051eac2edbf4", "score": "0.5221516", "text": "func newHttpServer(ctx context.Context, serverPort int) (*http.Server, error) {\n\tlogrus.Info(\"Instantiating HTTP server\")\n\n\t// Create HTTP router\n\trouter := http.NewServeMux()\n\trouter.HandleFunc(\"/swagger.json\", func(w http.ResponseWriter, req *http.Request) {\n\t\t_,_ = io.Copy(w, strings.NewReader(openapi.Swagger))\n\t})\n\n\t// Serve Swagger\n\tserveSwagger(router)\n\n\t// Initialize gRPC Gateway\n\tgw, err := newGateway(ctx, serverPort)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"unable to initialize gRPC Gateway: %v\", err)\n\t}\n\n\trouter.Handle(\"/\", gw)\n\n\t// Return HTTP Server instance\n\treturn &http.Server{\n\t\tAddr: fmt.Sprintf(\"%s:%d\", httpServerAddr, serverPort),\n\t\tHandler: router,\n\t\tIdleTimeout: 120 * time.Second,\n\t}, nil\n}", "title": "" }, { "docid": "34f608d0f6c56a6dece13b16c1934e11", "score": "0.5218583", "text": "func (s *ServerService) Create(context context.Context, params CreateServerParams) (*ServerDetails, error) {\n\tdata := struct {\n\t\tResponse struct {\n\t\t\tServer ServerDetails\n\t\t}\n\t}{}\n\terr := s.client.post(context, \"server/create\", &data, params)\n\treturn &data.Response.Server, err\n}", "title": "" }, { "docid": "d20b924064f12331cab564237a900150", "score": "0.521293", "text": "func CreateServer() *negroni.Negroni {\n\t//create Classic server\n\tserver := negroni.Classic()\n\t\n\t//create a router object\n\trouter := mux.NewRouter()\n\t\n\t//initialize routes\n\tsetRoutes(router)\n\n\t//apply route handler to server\n\tserver.UseHandler(router)\n\t\n\treturn server\n}", "title": "" }, { "docid": "2f2af6e84e336439b977b32e081d091a", "score": "0.5211668", "text": "func CreateServer() {\n\thttp.HandleFunc(\"/health-check\", HealthCheck)\n\tif err := http.ListenAndServe(\":5000\", nil); err != nil {\n\t\tclog.Panicf(\"failed to start server - %+v\", err)\n\t}\n\tclog.Info(\"go server started and is listening on : 5000\")\n}", "title": "" }, { "docid": "ee5db97831454dc5c0d77778689acea2", "score": "0.52091765", "text": "func DefaultServer(ConfigFilePath *string) *RServer {\n\n\tconf := NewRServerConfig(*ConfigFilePath)\n\t// Create a new REST Server\n\tserver := NewRServer(conf)\n\tserver.LogDebugf(\"DefaultServer\", \"config file path is %s\", conf.Helper.FilePath)\n\n\tok := server.LoadConfig()\n\t// we failed to load the configuration file\n\tif !ok {\n\t\tserver.LogError(\"DefaultServer \", \"failed to load configuration file\")\n\t}\n\n\tserver.LogDebugf(\"DefaultServer\", \"Loaded config from %s\", conf.Helper.FilePath)\n\n\treturn server\n}", "title": "" }, { "docid": "0684f12b0c84601fb8b599bb0579cdb8", "score": "0.52079177", "text": "func (c *ServerClient) Create(params ServerParams) (*Server, error) {\n\tvar result Server\n\terr := c.Backend.CallIntoInterface(\"v1/Storm/Server/create\", params, &result)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &result, nil\n}", "title": "" }, { "docid": "63821f6bd5ff20df9b0df815274923a0", "score": "0.520761", "text": "func NewServer(ctx *pulumi.Context,\n\tname string, args *ServerArgs, opts ...pulumi.ResourceOption) (*Server, error) {\n\tif args == nil {\n\t\targs = &ServerArgs{}\n\t}\n\n\tif args.HostKey != nil {\n\t\targs.HostKey = pulumi.ToSecret(args.HostKey).(pulumi.StringPtrInput)\n\t}\n\tif args.PostAuthenticationLoginBanner != nil {\n\t\targs.PostAuthenticationLoginBanner = pulumi.ToSecret(args.PostAuthenticationLoginBanner).(pulumi.StringPtrInput)\n\t}\n\tif args.PreAuthenticationLoginBanner != nil {\n\t\targs.PreAuthenticationLoginBanner = pulumi.ToSecret(args.PreAuthenticationLoginBanner).(pulumi.StringPtrInput)\n\t}\n\tsecrets := pulumi.AdditionalSecretOutputs([]string{\n\t\t\"hostKey\",\n\t\t\"postAuthenticationLoginBanner\",\n\t\t\"preAuthenticationLoginBanner\",\n\t})\n\topts = append(opts, secrets)\n\tvar resource Server\n\terr := ctx.RegisterResource(\"aws:transfer/server:Server\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "22e9794c20d6bea5d5ac09bf3b3c6bec", "score": "0.520381", "text": "func NewServer(id string) (*Server, error) {\n\tserver := Server{\n\t\tID: id,\n\t\tPrefix: \".\",\n\t}\n\t_, err := servers.InsertOne(ctx, server)\n\n\tif err != nil {\n\t\treturn &Server{}, err\n\t}\n\n\treturn &server, nil\n}", "title": "" }, { "docid": "aed27cb886e9e6094b46aba89931e51b", "score": "0.51882225", "text": "func New(ctx context.Context, config *Config) (*Server, error) {\n\tserver := &Server{\n\t\tclients: make([]Client, 0, len(config.NameServers)+len(config.NameServer)),\n\t\ttag: config.Tag,\n\t}\n\n\t// Prepare external rules for matchers generating\n\trawExternalRules := make(map[string][]string)\n\tfor key, value := range config.ExternalRules {\n\t\trawExternalRules[key] = value.Patterns\n\t}\n\n\tif server.tag == \"\" {\n\t\tserver.tag = generateRandomTag()\n\t}\n\tif len(config.ClientIp) > 0 {\n\t\tif len(config.ClientIp) != net.IPv4len && len(config.ClientIp) != net.IPv6len {\n\t\t\treturn nil, newError(\"unexpected IP length\", len(config.ClientIp))\n\t\t}\n\t\tserver.clientIP = net.IP(config.ClientIp)\n\t}\n\n\thosts, err := NewStaticHosts(config.StaticHosts, config.Hosts, rawExternalRules)\n\tif err != nil {\n\t\treturn nil, newError(\"failed to create hosts\").Base(err)\n\t}\n\tserver.hosts = hosts\n\n\taddNameServer := func(endpoint *net.Endpoint) int {\n\t\taddress := endpoint.Address.AsAddress()\n\t\tif address.Family().IsDomain() && address.Domain() == \"localhost\" {\n\t\t\tserver.clients = append(server.clients, NewLocalNameServer())\n\t\t} else if address.Family().IsDomain() && strings.HasPrefix(address.Domain(), \"https+local://\") {\n\t\t\t// URI schemed string treated as domain\n\t\t\t// DOH Local mode\n\t\t\tu, err := url.Parse(address.Domain())\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalln(newError(\"DNS config error\").Base(err))\n\t\t\t}\n\t\t\tserver.clients = append(server.clients, NewDoHLocalNameServer(u, server.clientIP))\n\t\t} else if address.Family().IsDomain() &&\n\t\t\tstrings.HasPrefix(address.Domain(), \"https://\") {\n\t\t\t// DOH Remote mode\n\t\t\tu, err := url.Parse(address.Domain())\n\t\t\tif err != nil {\n\t\t\t\tlog.Fatalln(newError(\"DNS config error\").Base(err))\n\t\t\t}\n\t\t\tidx := len(server.clients)\n\t\t\tserver.clients = append(server.clients, nil)\n\n\t\t\t// need the core dispatcher, register DOHClient at callback\n\t\t\tcommon.Must(core.RequireFeatures(ctx, func(d routing.Dispatcher) {\n\t\t\t\tc, err := NewDoHNameServer(u, d, server.clientIP)\n\t\t\t\tif err != nil {\n\t\t\t\t\tlog.Fatalln(newError(\"DNS config error\").Base(err))\n\t\t\t\t}\n\t\t\t\tserver.clients[idx] = c\n\t\t\t}))\n\t\t} else {\n\t\t\t// UDP classic DNS mode\n\t\t\tdest := endpoint.AsDestination()\n\t\t\tif dest.Network == net.Network_Unknown {\n\t\t\t\tdest.Network = net.Network_UDP\n\t\t\t}\n\t\t\tif dest.Network == net.Network_UDP {\n\t\t\t\tidx := len(server.clients)\n\t\t\t\tserver.clients = append(server.clients, nil)\n\n\t\t\t\tcommon.Must(core.RequireFeatures(ctx, func(d routing.Dispatcher) {\n\t\t\t\t\tserver.clients[idx] = NewClassicNameServer(dest, d, server.clientIP)\n\t\t\t\t}))\n\t\t\t}\n\t\t}\n\t\treturn len(server.clients) - 1\n\t}\n\n\tif len(config.NameServers) > 0 {\n\t\tfeatures.PrintDeprecatedFeatureWarning(\"simple DNS server\")\n\t\tfor _, destPB := range config.NameServers {\n\t\t\taddNameServer(destPB)\n\t\t}\n\t}\n\n\tif len(config.NameServer) > 0 {\n\t\tdomainMatcher := &strmatcher.MatcherGroup{}\n\t\tdomainIndexMap := make(map[uint32]uint32)\n\t\tipIndexMap := make(map[uint32]*MultiGeoIPMatcher)\n\t\tvar geoIPMatcherContainer router.GeoIPMatcherContainer\n\n\t\tfor _, ns := range config.NameServer {\n\t\t\tidx := addNameServer(ns.Address)\n\n\t\t\tfor _, domain := range ns.PrioritizedDomain {\n\t\t\t\tif domain.Type != DomainMatchingType_New {\n\t\t\t\t\tdomain.Domain = typeMapper[domain.Type] + domain.Domain\n\t\t\t\t}\n\t\t\t\tmidx, err := domainMatcher.ParsePattern(domain.Domain, rawExternalRules)\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn nil, newError(\"failed to create prioritized domain\").Base(err).AtWarning()\n\t\t\t\t}\n\t\t\t\tdomainIndexMap[midx] = uint32(idx)\n\t\t\t}\n\n\t\t\t// only add to ipIndexMap if GeoIP is configured\n\t\t\tif len(ns.Geoip) > 0 {\n\t\t\t\tvar matchers []*router.GeoIPMatcher\n\t\t\t\tfor _, geoip := range ns.Geoip {\n\t\t\t\t\tmatcher, err := geoIPMatcherContainer.Add(geoip)\n\t\t\t\t\tif err != nil {\n\t\t\t\t\t\treturn nil, newError(\"failed to create ip matcher\").Base(err).AtWarning()\n\t\t\t\t\t}\n\t\t\t\t\tmatchers = append(matchers, matcher)\n\t\t\t\t}\n\t\t\t\tmatcher := &MultiGeoIPMatcher{matchers: matchers}\n\t\t\t\tipIndexMap[uint32(idx)] = matcher\n\t\t\t}\n\t\t}\n\n\t\tserver.domainMatcher = domainMatcher\n\t\tserver.domainIndexMap = domainIndexMap\n\t\tserver.ipIndexMap = ipIndexMap\n\t}\n\n\tif len(server.clients) == 0 {\n\t\tserver.clients = append(server.clients, NewLocalNameServer())\n\t}\n\n\tif err := InitFakeIPServer(config.Fake, rawExternalRules); err != nil {\n\t\treturn nil, newError(\"failed to initilaize fake ip server\").Base(err)\n\t}\n\n\treturn server, nil\n}", "title": "" }, { "docid": "908c6bb5363d55379f81144604b76ee4", "score": "0.5186099", "text": "func createDefaultParamServerWithKey(privkey *koblitz.PrivateKey, authrpc bool) (rpcListener *cxrpc.OpencxRPCCaller, err error) {\n\treturn createFullServer([]*coinparam.Params{&coinparam.RegressionNetParams, newVTC, &coinparam.LiteRegNetParams}, \"localhost\", uint16(12347), privkey, authrpc)\n}", "title": "" }, { "docid": "16bfdc94b358f16b319e9ca23e40e84d", "score": "0.5184624", "text": "func (s *Server) newServer(proto, addr string) ([]*HTTPServer, error) {\n\tvar (\n\t\tls []net.Listener\n\t)\n\tswitch proto {\n\tcase \"tcp\":\n\t\tl, err := s.initTCPSocket(addr)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\tls = append(ls, l)\n\n\tdefault:\n\t\treturn nil, errors.New(\"Invalid protocol format. Windows only supports tcp.\")\n\t}\n\n\tvar res []*HTTPServer\n\tfor _, l := range ls {\n\t\tres = append(res, &HTTPServer{\n\t\t\t&http.Server{\n\t\t\t\tAddr: addr,\n\t\t\t},\n\t\t\tl,\n\t\t})\n\t}\n\treturn res, nil\n\n}", "title": "" }, { "docid": "937d0f96620b6d133875a58764a91f9b", "score": "0.5182345", "text": "func NewServer(host, user, passwd string) *Space {\n\treturn &Space{\n\t\tHost: host,\n\t\tUser: user,\n\t\tPassword: passwd,\n\t\tTransport: &http.Transport{\n\t\t\tTLSClientConfig: &tls.Config{\n\t\t\t\tInsecureSkipVerify: true,\n\t\t\t},\n\t\t},\n\t}\n}", "title": "" }, { "docid": "1090541345848ca2bcaaa8b4ed9743d9", "score": "0.5171907", "text": "func New(mpdAddr, mpdPasswd string) (s *Server) {\n s = &Server{\n conns: make(map[*Conn]bool),\n drop: make(chan *Conn),\n done: make(chan bool),\n Log: make(chan interface{}),\n }\n s.mpd = NewMpd(mpdAddr, mpdPasswd, s.Log)\n s.watcher = NewWatcher(mpdAddr, mpdPasswd, s.mpd.cmd, s.Log)\n go s.run()\n return\n}", "title": "" }, { "docid": "4a2729defeee2b121a6d54fc7fa0e3f0", "score": "0.51652807", "text": "func createNewSyncer(configFile string, server *httptest.Server) (*Syncer, error) {\n\t// Load a config with the server's URL\n\tconfig, err := LoadConfig(configFile)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tsyncer, err := NewSyncer(config, NewInMemoryOutputCollection(), logrus.NewEntry(logrus.New()), metricsForTest())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tsyncer.config.CaFile = \"fixtures/CA/localhost.crt\"\n\n\treturn resetSyncerServer(syncer, server), nil\n}", "title": "" } ]
3f70187401ed7560218160b12f5a9413
MatchesLabelFilter returns true if the spec satisfies the passed in label filter query
[ { "docid": "93ba6c8cbeda8280873faf4f9307a92c", "score": "0.8153823", "text": "func (report SpecReport) MatchesLabelFilter(query string) (bool, error) {\n\tfilter, err := ParseLabelFilter(query)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\treturn filter(report.Labels()), nil\n}", "title": "" } ]
[ { "docid": "b1cf21acb1819c6b102efc5b1e42304d", "score": "0.7033321", "text": "func LabelFilter(ctx context.Context, labelfilter string) ResultFilter {\n\t// We need to handle both label=key and label=key=value\n\treturn func(i *Image) bool {\n\t\tvar value string\n\t\tsplitFilter := strings.Split(labelfilter, \"=\")\n\t\tkey := splitFilter[0]\n\t\tif len(splitFilter) > 1 {\n\t\t\tvalue = splitFilter[1]\n\t\t}\n\t\tlabels, err := i.Labels(ctx)\n\t\tif err != nil {\n\t\t\treturn false\n\t\t}\n\t\tif len(strings.TrimSpace(labels[key])) > 0 && len(strings.TrimSpace(value)) == 0 {\n\t\t\treturn true\n\t\t}\n\t\treturn labels[key] == value\n\t}\n}", "title": "" }, { "docid": "b482276252d84782ab3718f8621f4aa7", "score": "0.66300684", "text": "func LabelMatch(pod api.Pod, queryKey, queryValue string) bool {\n\tfor key, value := range pod.Labels {\n\t\tif queryKey == key && queryValue == value {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "e0bd71602831392c478b5c565c7c8268", "score": "0.65099263", "text": "func (config *HTTPConfig) LabelFilter(filter map[string]string) bool {\n\tif len(filter) == 0 {\n\t\treturn false\n\t}\n\tif len(config.Label) == 0 {\n\t\treturn false\n\t}\n\tfor k, v := range filter {\n\t\tif value, ok := config.Label[k]; ok && v == value {\n\t\t\tcontinue\n\t\t} else {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "6d3aa95972476be6c7c87ed1848fbb5c", "score": "0.6372379", "text": "func (o ApplicationSetSpecGeneratorsScmProviderFiltersOutput) LabelMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationSetSpecGeneratorsScmProviderFilters) *string { return v.LabelMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "0f8e9a77aae5e22cc923201ee7344419", "score": "0.63186574", "text": "func (config *TCPConfig) LabelFilter(filter map[string]string) bool {\n\tif len(filter) == 0 {\n\t\treturn false\n\t}\n\tif len(config.Label) == 0 {\n\t\treturn false\n\t}\n\tfor k, v := range filter {\n\t\tif value, ok := config.Label[k]; ok && v == value {\n\t\t\tcontinue\n\t\t} else {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "a0df0967fbf1cd18e235d0154b76a31d", "score": "0.6277073", "text": "func (o ApplicationSetSpecGeneratorsMatrixGeneratorsScmProviderFiltersOutput) LabelMatch() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationSetSpecGeneratorsMatrixGeneratorsScmProviderFilters) *string { return v.LabelMatch }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "318ee8be79d67a4729adc60bf2554311", "score": "0.6155971", "text": "func LabelFilter(labels map[string]string) factory.EventFilterFunc {\n\treturn func(obj interface{}) bool {\n\t\tif tombstone, ok := obj.(cache.DeletedFinalStateUnknown); ok {\n\t\t\tobj = tombstone.Obj\n\t\t}\n\t\tmetaObj, ok := obj.(metav1.Object)\n\t\tif !ok {\n\t\t\tklog.Errorf(\"Unexpected type %T\", obj)\n\t\t\treturn false\n\t\t}\n\t\tobjLabels := metaObj.GetLabels()\n\t\tfor k, v := range labels {\n\t\t\tif objLabels[k] != v {\n\t\t\t\treturn false\n\t\t\t}\n\t\t}\n\t\treturn true\n\t}\n}", "title": "" }, { "docid": "e5b784a002604d440cf73fa1a37dee35", "score": "0.6084912", "text": "func LabelsMatch(pod api.Pod, labelQuery *map[string]string) bool {\n\tif labelQuery == nil {\n\t\treturn true\n\t}\n\tfor key, value := range *labelQuery {\n\t\tif !LabelMatch(pod, key, value) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "4897356e624ff65d3ed49cd36f633e4c", "score": "0.6068695", "text": "func LabelMatches(label string, expr string) string {\n\treturn fmt.Sprintf(\"%s=~%q\", label, expr)\n}", "title": "" }, { "docid": "8e2d8104dc6a3e444d74321ad331af52", "score": "0.6000034", "text": "func (m *LabelMatcher) Match(labels *BackendLabels) bool {\n\tfor _, item := range labels.Labels {\n\t\tif m.backendLabel == item {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "09d48bded815e87759f40cb5c917028d", "score": "0.5854793", "text": "func (w *Workload) LabelsMatch(role, app, env, loc string, labelMap map[string]Label) bool {\n\tif (role == \"*\" || w.GetRole(labelMap).Value == role) &&\n\t\t(app == \"*\" || w.GetApp(labelMap).Value == app) &&\n\t\t(env == \"*\" || w.GetEnv(labelMap).Value == env) &&\n\t\t(loc == \"*\" || w.GetLoc(labelMap).Value == loc) {\n\t\treturn true\n\t}\n\treturn false\n}", "title": "" }, { "docid": "eab64db373bae76bf40dcc78a2f64004", "score": "0.58024484", "text": "func (fs Filters) HasLabel(name string) bool {\n\tfor _, f := range fs {\n\t\tif f.HasLabel(name) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "bcfa4a962297b123fab1de878c32f8f3", "score": "0.57542616", "text": "func (b *Bucket) Match(s Selector) bool {\n\tif s == nil {\n\t\treturn false\n\t}\n\n\tfor k, v := range s {\n\t\tvv, ok := b.Labels[k]\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\t\tfound := false\n\t\tfor _, vvor := range strings.Split(v, \"|\") {\n\t\t\tfound = (found || (vvor == vv))\n\t\t}\n\t\tif !found {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "aa5a45ad4f03bef239ec6ae7d5d4306d", "score": "0.57018787", "text": "func (m LabelSelector) Matches(s LabelSet) bool {\n\tif matchSelector(m.Exclude.Labels, s.Labels, false) {\n\t\treturn false // At least one excluded label is matched.\n\t} else if !matchSelector(m.Include.Labels, s.Labels, true) {\n\t\treturn false // Not every included label is matched.\n\t}\n\treturn true\n}", "title": "" }, { "docid": "cbcf97b62932b0756dfc81294ba4dc24", "score": "0.5687542", "text": "func matchViaLabelSelector(namespace *corev1.Namespace, distributor *appsv1alpha1.ResourceDistribution) (bool, error) {\n\tselector, err := metav1.LabelSelectorAsSelector(&distributor.Spec.Targets.NamespaceLabelSelector)\n\tif err != nil {\n\t\treturn false, err\n\t}\n\tif !selector.Empty() && selector.Matches(labels.Set(namespace.Labels)) {\n\t\treturn true, nil\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "b389b62e54d25c56f633d9dff618f800", "score": "0.56805927", "text": "func (s *LabelSelector) Matches(labels map[string]string) bool {\n\tfor label, expectedValue := range s.Selector {\n\t\tvalue, ok := labels[label]\n\t\tif !ok || expectedValue != value {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "d671689fcc4e92a7865a0f18b9fe75cf", "score": "0.56694144", "text": "func (label *Label) Match(other *Label) bool {\n\tif label == other {\n\t\treturn true\n\t}\n\tif !label.wildcard && !other.wildcard {\n\t\treturn label.simpleName == other.simpleName\n\t}\n\tif len(label.names) != len(other.names) {\n\t\treturn false\n\t}\n\tfor i := range label.names {\n\t\tif !label.nameMatch(label.names[i], other.names[i]) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "ca2162396d8f8e2cec1c42a069c9c115", "score": "0.5648932", "text": "func (usage Usage) matchesLabel(labels []string) bool {\n\t// if asset has no labels always match\n\tif len(labels) == 0 {\n\t\treturn true\n\t}\n\n\tfor _, validLabel := range usage.Labels {\n\t\tfor _, label := range labels {\n\t\t\tif label == validLabel {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "a4adbab038f68e742f586b645d2e3da1", "score": "0.5621292", "text": "func ByLabel(key string) predicate.Funcs {\n\treturn kubermaticpred.Factory(func(o ctrlruntimeclient.Object) bool {\n\t\tlabels := o.GetLabels()\n\t\tif existingValue, ok := labels[key]; ok {\n\t\t\tif existingValue == o.GetName() {\n\t\t\t\treturn true\n\t\t\t}\n\t\t}\n\t\treturn false\n\t})\n}", "title": "" }, { "docid": "6d971237866d33645aaad1169d0f42a0", "score": "0.5605436", "text": "func matchFilterset(lset labels.Labels, filterset []*promlabels.Matcher) bool {\n\tfor _, matcher := range filterset {\n\t\tif !matcher.Matches(lset.Get(matcher.Name)) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "01b72b15bcb3181eb1c71afc76ab2cd5", "score": "0.5602178", "text": "func LabelEq(label string, value string) string {\n\treturn fmt.Sprintf(\"%s=%q\", label, value)\n}", "title": "" }, { "docid": "39d87579f28f07f3911741e5b333f6c6", "score": "0.55362743", "text": "func whereLabelValueMatches(containers context.Context, label, pattern string) (context.Context, error) {\n\trx, err := regexp.Compile(pattern)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn generalizedWhereLabel(\"whereLabelValueMatches\", containers, label, func(value string, ok bool) bool {\n\t\treturn ok && rx.MatchString(value)\n\t})\n}", "title": "" }, { "docid": "83083b27f2d58d52a793a2919f482bce", "score": "0.5499418", "text": "func (e *Evaluation) isLabelMatch(term v1alpha1.SelectorTerm) (bool, error) {\n\tif len(term.MatchLabels)+len(term.MatchLabelExpressions) == 0 {\n\t\t// Match is true if there are no label expressions\n\t\t//\n\t\t// Note that these expressions are optional\n\t\treturn true, nil\n\t}\n\n\tif e.Target == nil {\n\t\treturn false, errors.Errorf(\"Evaluation failed: Nil target\")\n\t}\n\n\tsel := &metav1.LabelSelector{\n\t\tMatchLabels: term.MatchLabels,\n\t\tMatchExpressions: term.MatchLabelExpressions,\n\t}\n\tlblSel, err := metav1.LabelSelectorAsSelector(sel)\n\tif err != nil {\n\t\treturn false, errors.Wrapf(err, \"Invalid label expressions: %v\", sel)\n\t}\n\n\treturn lblSel.Matches(labels.Set(e.Target.GetLabels())), nil\n}", "title": "" }, { "docid": "d1f9ea6bb4366a27f0e14f5c5175daef", "score": "0.5493885", "text": "func (c *Controller) isLabelSelectorMatching(selector map[string]string, labelSelector *metav1.LabelSelector) bool {\n\t// If the resource has no selectors, then assume it targets different Pods.\n\tif len(selector) == 0 {\n\t\treturn false\n\t}\n\tfor label, value := range selector {\n\t\tif rsValue, ok := labelSelector.MatchLabels[label]; !ok || rsValue != value {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "3a474f1b81b361ddbeb7686b2d57bbaa", "score": "0.54739106", "text": "func (g *Group) Matches(labels map[string]string) bool {\n\tfor key, val := range g.Selector {\n\t\tif labels == nil || labels[key] != val {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "c8aee8c8735812c233c56226d8b7a249", "score": "0.54701245", "text": "func (s *KubeflowLabels) matchLabels(parameters map[string]string) []string {\n\tregex := []*regexp.Regexp{}\n\n\tfor prefix, value := range parameters {\n\t\tif strings.TrimSpace(value) == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\texpr := fmt.Sprintf(\"%v.*/.*%v.*\", strings.ToLower(prefix), strings.ToLower(value))\n\t\tm, err := regexp.Compile(expr)\n\n\t\tif err != nil {\n\t\t\tlog.Errorf(\"Could not compile the regex: %v ; error %v\", expr, err)\n\t\t\tcontinue\n\t\t}\n\t\tregex = append(regex, m)\n\t}\n\n\tlabels := []string{}\n\tfor label, _ := range s.Labels {\n\t\tfor _, p := range regex {\n\t\t\ts := strings.ToLower(label)\n\t\t\tif match := p.MatchString(s); match {\n\t\t\t\tlabels = append(labels, label)\n\t\t\t}\n\t\t}\n\t}\n\n\treturn labels\n}", "title": "" }, { "docid": "f04b511e518ddd6058637ea329528ae7", "score": "0.5449388", "text": "func (r resourceFilterPredicate) eventFilter(eventLabels map[string]string) bool {\n\treturn r.Selector.Matches(labels.Set(eventLabels))\n}", "title": "" }, { "docid": "b4087de2d647626d666fb48bc0a30aa5", "score": "0.5432111", "text": "func (in *InType) Match(match *Element, labels map[string]string) (bool, error) {\n\tvalues, ok := match.Value.([]interface{})\n\tif !ok {\n\t\treturn false, fmt.Errorf(\"invalid in oper with value: %v, should be array string\", match.Value)\n\t}\n\n\tto, exists := labels[match.Key]\n\tif !exists {\n\t\treturn false, nil\n\t}\n\n\tfor _, val := range values {\n\t\tif val == to {\n\t\t\treturn true, nil\n\t\t}\n\t}\n\n\treturn false, nil\n}", "title": "" }, { "docid": "8db101cfe432ad62e6e608ef5cf09633", "score": "0.54178256", "text": "func LabelFilters(user *model.User, filtersArgs *filters.Args, appName string) {\n\tif appName != \"\" && isMultiApp(user) {\n\t\tfiltersArgs.Add(\"label\", fmt.Sprintf(\"%s=%s\", commons.AppLabel, appName))\n\t} else if !IsAdmin(user) {\n\t\tfiltersArgs.Add(\"label\", fmt.Sprintf(\"%s=%s\", commons.OwnerLabel, user.Username))\n\t}\n}", "title": "" }, { "docid": "0fb0db1691afd2884f6152b5f783b805", "score": "0.54009014", "text": "func matchLabels(lhs []string, rhs []string) bool {\n\tif len(lhs) != len(rhs) {\n\t\treturn false\n\t}\n\n\tfor i := range lhs {\n\t\tif !(lhs[i] == rhs[i] || lhs[i] == \"*\" || rhs[i] == \"*\") {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "e421aa8ae15732d741b97120391822b5", "score": "0.5398428", "text": "func NamespaceLabelFilter() predicate.Predicate {\n\tf := func(labels map[string]string) bool {\n\t\tif labels == nil {\n\t\t\treturn true\n\t\t}\n\t\tns, ok := labels[constants.NamespaceLabelKey]\n\t\tif !ok {\n\t\t\treturn true\n\t\t}\n\t\tif ns == constants.InteroperatorNamespace {\n\t\t\treturn true\n\t\t}\n\t\treturn false\n\t}\n\tp := predicate.Funcs{\n\t\tCreateFunc: func(e event.CreateEvent) bool {\n\t\t\treturn f(e.Meta.GetLabels())\n\t\t},\n\t\tDeleteFunc: func(e event.DeleteEvent) bool {\n\t\t\treturn f(e.Meta.GetLabels())\n\t\t},\n\t\tUpdateFunc: func(e event.UpdateEvent) bool {\n\t\t\treturn f(e.MetaNew.GetLabels())\n\t\t},\n\t\tGenericFunc: func(e event.GenericEvent) bool {\n\t\t\treturn f(e.Meta.GetLabels())\n\t\t},\n\t}\n\treturn p\n}", "title": "" }, { "docid": "1d84a462caaede246edbcd43b60c1d54", "score": "0.53967625", "text": "func (ms Matchers) Matches(lset model.LabelSet) bool {\n\tfor _, m := range ms {\n\t\tif !m.Matches(string(lset[model.LabelName(m.Name)])) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "32a413ccb926fbcc1b08c58540c42239", "score": "0.5365719", "text": "func (f Filter) HasLabel(name string) bool {\n\treturn f.Action.AddLabel == name\n}", "title": "" }, { "docid": "f6e13456dfe8ccb0e5430cba216c820c", "score": "0.53303367", "text": "func Matcher(label labels.Selector, field fields.Selector) generic.Matcher {\n\treturn &generic.SelectionPredicate{\n\t\tLabel: label,\n\t\tField: field,\n\t\tGetAttrs: func(obj runtime.Object) (labels.Set, fields.Set, error) {\n\t\t\tdeploymentConfig, ok := obj.(*api.DeploymentConfig)\n\t\t\tif !ok {\n\t\t\t\treturn nil, nil, fmt.Errorf(\"not a DeploymentConfig\")\n\t\t\t}\n\t\t\treturn labels.Set(deploymentConfig.ObjectMeta.Labels), api.DeploymentConfigToSelectableFields(deploymentConfig), nil\n\t\t},\n\t}\n}", "title": "" }, { "docid": "6e58bc7182a2b33fa948744c704a263b", "score": "0.53056633", "text": "func (i *Info) Matches(filter *k8s.ImageFilter) bool {\n\tif filter == nil || filter.Image == nil {\n\t\treturn true\n\t}\n\tref := filter.Image.Image\n\tif strings.HasPrefix(i.ID, ref) {\n\t\treturn true\n\t}\n\tfor _, tag := range i.Ref.tags {\n\t\tif strings.HasPrefix(tag, ref) {\n\t\t\treturn true\n\t\t}\n\t}\n\tfor _, digest := range i.Ref.digests {\n\t\tif strings.HasPrefix(digest, ref) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "6e46073327e23c9ea6266ee2cfe05829", "score": "0.52909374", "text": "func (w *WebhookConstraintMatcher) Match(\n\tr admissionregistrationv1beta1.RuleWithOperations,\n\tobjLabelSelector *metav1.LabelSelector,\n\tnamespaceLabelSelector *metav1.LabelSelector,\n) bool {\n\tvar (\n\t\tobjLabels = w.ObjectLabels\n\t\tnsLabels = w.NamespaceLabels\n\t)\n\n\tif objLabels == nil {\n\t\tobjLabels = labels.Set{}\n\t}\n\n\tif nsLabels == nil {\n\t\tnsLabels = labels.Set{}\n\t}\n\n\tnsSelector, err := defaultEmptySelector(namespaceLabelSelector)\n\tif err != nil {\n\t\t// this should really not happen\n\t\treturn true\n\t}\n\n\tobjSelector, err := defaultEmptySelector(objLabelSelector)\n\tif err != nil {\n\t\t// this should really not happen\n\t\treturn true\n\t}\n\n\tmatchObj := objSelector.Empty() || objSelector.Matches(objLabels)\n\tmatchNS := nsSelector.Empty() || nsSelector.Matches(nsLabels)\n\n\trm := ruleMatcher{rule: r, gvr: w.GVR, subresource: w.Subresource}\n\tif !w.ClusterScoped {\n\t\trm.namespace = \"dummy\"\n\t}\n\n\treturn matchObj && (w.ClusterScoped || matchNS) && rm.Matches()\n}", "title": "" }, { "docid": "888ce5f4ff239c1e19835498be459544", "score": "0.5282137", "text": "func (eq *EqualType) Match(match *Element, labels map[string]string) (bool, error) {\n\tval, ok := match.Value.(string)\n\tif !ok {\n\t\treturn false, fmt.Errorf(\"invalid eq oper with value: %v, should be string\", match.Value)\n\t}\n\n\tto, exists := labels[match.Key]\n\tif !exists {\n\t\treturn false, nil\n\t}\n\n\treturn val == to, nil\n}", "title": "" }, { "docid": "9d1ca92c2f4f69b5a144ab2544b92640", "score": "0.5233646", "text": "func (m *Matcher) Match(lset model.LabelSet) bool {\n\t// Unset labels are treated as unset labels globally. Thus, if a\n\t// label is not set we retrieve the empty label which is correct\n\t// for the comparison below.\n\tv := lset[m.Name]\n\n\tif m.isRegex {\n\t\treturn m.regex.MatchString(string(v))\n\t}\n\treturn string(v) == m.Value\n}", "title": "" }, { "docid": "3fb459b4e372a093238a52472951dbdd", "score": "0.52293366", "text": "func (p LabelPrefix) matches(l labels.Label) (bool, int) {\n\tif p.Source != \"\" && p.Source != l.Source {\n\t\treturn false, 0\n\t}\n\n\t// If no regular expression is available, fall back to prefix matching\n\tif p.expr == nil {\n\t\treturn strings.HasPrefix(l.Key, p.Prefix), len(p.Prefix)\n\t}\n\n\tres := p.expr.FindStringIndex(l.Key)\n\n\t// No match if regexp was not found\n\tif res == nil {\n\t\treturn false, 0\n\t}\n\n\t// Otherwise match if match was found at start of key\n\treturn res[0] == 0, res[1]\n}", "title": "" }, { "docid": "18381ff483d20ed365f76198a32ddb35", "score": "0.52144283", "text": "func (f *StringFilter) Matches(s string) bool {\n\tif f == nil {\n\t\treturn true\n\t}\n\tnegated, matched := f.staticSet[s]\n\t// If a metric is negated and it matched it won't match anything else by\n\t// definition.\n\tif matched && negated {\n\t\treturn false\n\t}\n\n\tfor _, reMatch := range f.regexps {\n\t\treMatched, negated := reMatch.Matches(s)\n\t\tif reMatched && negated {\n\t\t\treturn false\n\t\t}\n\t\tmatched = matched || reMatched\n\t}\n\n\tfor _, globMatcher := range f.globs {\n\t\tglobMatched, negated := globMatcher.Matches(s)\n\t\tif globMatched && negated {\n\t\t\treturn false\n\t\t}\n\t\tmatched = matched || globMatched\n\t}\n\treturn matched\n}", "title": "" }, { "docid": "32c0667cc54f1b27a070b1b0d123d6bc", "score": "0.5195262", "text": "func (le *LessThanEqualType) Match(match *Element, labels map[string]string) (bool, error) {\n\tif !isNumeric(match.Value) {\n\t\treturn false, fmt.Errorf(\"invalid le oper with value: %v, should be number\", match.Value)\n\t}\n\n\tfrom := mustFloat64(match.Value)\n\n\tcompare, exists := labels[match.Key]\n\tif !exists {\n\t\treturn false, nil\n\t}\n\n\tto, err := strconv.ParseFloat(compare, 10)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"parse le oper's target label value: %s to float failed, err: %v\", compare, err)\n\t}\n\n\treturn to <= from, nil\n}", "title": "" }, { "docid": "a44c3ccabfccef832f0570890fc4f47a", "score": "0.51899177", "text": "func (bf *Filter) Match(s string) bool {\n\thashs := bf.hasher([]byte(s))\n\tsectionSize := ((bf.Size * 8) / bf.k)\n\tfor hid := uint64(0); hid < bf.k; hid++ {\n\t\tstart := hid * sectionSize\n\t\tif !bf.isSet(start + (hashs[hid] % (sectionSize))) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "a686df39a7666414ccb37db8fd1ea7c2", "score": "0.5188811", "text": "func (s StringLabel) Match(other string) bool {\n\treturn string(s) == other\n}", "title": "" }, { "docid": "f19505bcab7790104e9c54faca1e7ce0", "score": "0.5185814", "text": "func IsLabelSelectorMatching(srcSelector map[string]string, targetLabelSelector *metaV1.LabelSelector) bool {\n\t// Check to see if targetLabelSelector pointer is not nil.\n\tif targetLabelSelector != nil {\n\t\ttargetObjectLabels := targetLabelSelector.MatchLabels\n\t\treturn IsSelectorMatching(srcSelector, targetObjectLabels)\n\t}\n\treturn false\n}", "title": "" }, { "docid": "845fbb960ee7a9478149483ba2b94666", "score": "0.5161427", "text": "func stackLabelFilter(stackID string) filters.Args {\n\treturn filters.NewArgs(\n\t\tfilters.Arg(\"label\", fmt.Sprintf(\"%s=%s\", types.StackLabel, stackID)),\n\t)\n}", "title": "" }, { "docid": "00f6c27bad1f2d2b6b2ae01309733a4c", "score": "0.5150436", "text": "func Matches(pr *v1beta1.PipelineRun, cc *v1alpha1.ConcurrencyControl) bool {\n\t// TODO: Support MatchExpressions as well\n\treturn k8slabels.SelectorFromSet(cc.Spec.Selector.MatchLabels).Matches(k8slabels.Set(pr.Labels))\n}", "title": "" }, { "docid": "72537b6787a8ee408c32b586cc6ff96c", "score": "0.51405936", "text": "func (r *LoggingMetricResource) FilterMatches(filter string) bool {\n\treturn r.m.Filter == filter\n}", "title": "" }, { "docid": "247ddadb67ac7d9c498c98b511c66cf5", "score": "0.51380104", "text": "func appMatchesFilter(manifest apps.Manifest, filter string) bool {\n\tfilter = strings.TrimSpace(strings.ToLower(filter))\n\n\tif filter == \"\" {\n\t\treturn true\n\t}\n\n\tif strings.ToLower(string(manifest.AppID)) == filter {\n\t\treturn true\n\t}\n\n\tif strings.Contains(strings.ToLower(manifest.DisplayName), filter) {\n\t\treturn true\n\t}\n\n\tif strings.Contains(strings.ToLower(manifest.Description), filter) {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "2d85f63e139d1919e3ea89685126c657", "score": "0.5126684", "text": "func IsSelectorMatching(srcSelector map[string]string, targetObjectLabels map[string]string) bool {\n\t// If service has no selectors, then assume it targets different resource.\n\tif len(srcSelector) == 0 {\n\t\treturn false\n\t}\n\tfor label, value := range srcSelector {\n\t\tif rsValue, ok := targetObjectLabels[label]; !ok || rsValue != value {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "91a11c535c57261e3fd10ce69b06a2c7", "score": "0.51228213", "text": "func passFilter(container *runtimeApi.Container, filter *runtimeApi.ContainerFilter) bool {\n\tif filter == nil {\n\t\treturn true\n\t}\n\tif filter.Id != \"\" && filter.Id != container.Id {\n\t\treturn false\n\t}\n\tif filter.GetState() != nil && filter.GetState().State != container.State {\n\t\treturn false\n\t}\n\tif filter.PodSandboxId != \"\" && filter.PodSandboxId != container.PodSandboxId {\n\t\treturn false\n\t}\n\tfor key, value := range filter.LabelSelector {\n\t\tv, ok := container.Labels[key]\n\t\tif !ok || value != v {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "9d793c1b6fd41e73a2063a22484039ed", "score": "0.51086295", "text": "func Labels(f form.LabelSearch) (results []LabelResult, err error) {\n\tif err := f.ParseQueryString(); err != nil {\n\t\treturn results, err\n\t}\n\n\tdefer log.Debug(capture.Time(time.Now(), fmt.Sprintf(\"labels: search %s\", form.Serialize(f, true))))\n\n\ts := UnscopedDb()\n\n\t// s.LogMode(true)\n\n\ts = s.Table(\"labels\").\n\t\tSelect(`labels.*`).\n\t\tWhere(\"labels.deleted_at IS NULL\").\n\t\tWhere(\"labels.photo_count > 0\").\n\t\tGroup(\"labels.id\")\n\n\tif f.ID != \"\" {\n\t\ts = s.Where(\"labels.label_uid = ?\", f.ID)\n\n\t\tif result := s.Scan(&results); result.Error != nil {\n\t\t\treturn results, result.Error\n\t\t}\n\n\t\treturn results, nil\n\t}\n\n\tif f.Query != \"\" {\n\t\tvar labelIds []uint\n\t\tvar categories []entity.Category\n\t\tvar label entity.Label\n\n\t\tslugString := slug.Make(f.Query)\n\t\tlikeString := \"%\" + strings.ToLower(f.Query) + \"%\"\n\n\t\tif result := Db().First(&label, \"label_slug = ? OR custom_slug = ?\", slugString, slugString); result.Error != nil {\n\t\t\tlog.Infof(\"search: label %s not found\", txt.Quote(f.Query))\n\n\t\t\ts = s.Where(\"LOWER(labels.label_name) LIKE ?\", likeString)\n\t\t} else {\n\t\t\tlabelIds = append(labelIds, label.ID)\n\n\t\t\tDb().Where(\"category_id = ?\", label.ID).Find(&categories)\n\n\t\t\tfor _, category := range categories {\n\t\t\t\tlabelIds = append(labelIds, category.LabelID)\n\t\t\t}\n\n\t\t\tlog.Infof(\"search: label %s includes %d categories\", txt.Quote(label.LabelName), len(labelIds))\n\n\t\t\ts = s.Where(\"labels.id IN (?)\", labelIds)\n\t\t}\n\t}\n\n\tif f.Favorite {\n\t\ts = s.Where(\"labels.label_favorite = 1\")\n\t}\n\n\tif !f.All {\n\t\ts = s.Where(\"labels.label_priority >= 0 OR labels.label_favorite = 1\")\n\t}\n\n\tswitch f.Order {\n\tcase \"slug\":\n\t\ts = s.Order(\"labels.label_favorite DESC, custom_slug ASC\")\n\tdefault:\n\t\ts = s.Order(\"labels.label_favorite DESC, custom_slug ASC\")\n\t}\n\n\tif f.Count > 0 && f.Count <= 1000 {\n\t\ts = s.Limit(f.Count).Offset(f.Offset)\n\t} else {\n\t\ts = s.Limit(100).Offset(0)\n\t}\n\n\tif result := s.Scan(&results); result.Error != nil {\n\t\treturn results, result.Error\n\t}\n\n\treturn results, nil\n}", "title": "" }, { "docid": "2f0015476032e593baf35da44ae47f60", "score": "0.5089233", "text": "func MatchLabels(labels, candidate types.Labels) bool {\n\tif len(labels) == 0 {\n\t\treturn true\n\t}\n\tcmap := candidate.ToMap()\n\tfor _, label := range labels {\n\t\tif v, ok := cmap[label.Name]; !ok || v != label.Value {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "127073799b193738805b97f286c44898", "score": "0.5081886", "text": "func IsLabelSelector(s string) bool {\n\tif s == \"\" {\n\t\treturn false\n\t}\n\treturn LabelRx.MatchString(s)\n}", "title": "" }, { "docid": "1ae116d1ff26f2f26f8c8496fca8470a", "score": "0.50578827", "text": "func (r *Ring) Match(f metric.Filter) ([]metric.Metric, bool) {\n\n\tif len(r.buffer) == 0 {\n\t\tret := []metric.Metric{}\n\t\treturn ret, false\n\t}\n\tvar keys []string\n\tfor k := range r.buffer {\n\t\tkeys = append(keys, k)\n\t}\n\tsort.Strings(keys)\n\tret := []metric.Metric{}\n\tfor _, key := range keys {\n\t\tids := r.buffer[key]\n\t\tfor _, ms := range ids {\n\t\t\tfor _, m := range ms {\n\t\t\t\tif m.IsFiltered(f) {\n\t\t\t\t\tret = append(ret, m)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n\treturn ret, true\n}", "title": "" }, { "docid": "f8142c7e975e361f927d0b7f8ff20ce8", "score": "0.50566995", "text": "func (r ResourceRequirement) Matches(name string, gvr schema.GroupVersionResource, resourceLabels map[string]string) bool {\n\t// If Name or GVR is not a match, return false\n\t// Empty string for Name or GVR will match any value\n\tif !matches(r.Name, name) || !r.ResourceTypeRequirement.Matches(gvr) {\n\t\treturn false\n\t}\n\tif len(r.MatchExpressions) == 0 && len(r.MatchLabels) == 0 {\n\t\t// If there is no LabelSelector we return match of Name/GVR\n\t\treturn true\n\t}\n\tsel, err := metav1.LabelSelectorAsSelector(&r.LabelSelector)\n\tif err != nil {\n\t\t// A match was found on Name or GVR but labels could not be evaluated\n\t\t// and resource labels were provided, so false is returned.\n\t\treturn false\n\t}\n\treturn sel.Matches(labels.Set(resourceLabels))\n}", "title": "" }, { "docid": "9e9aa9f1dca0559c7bb5e2459943acbc", "score": "0.5046435", "text": "func applyFilterLabel(deps []dep, perform perform) []dep {\n\tif perform.Labels == \"\" {\n\t\tif perform.Verbose || !perform.Force {\n\t\t\tfmt.Println(\"Warning: No labels, using all deps of kind.\")\n\t\t}\n\n\t\tif !perform.Force && !askForConfirmation(\"Are you sure you want to continue?\\n\"+\n\t\t\t\"(use --force to suppress this prompt.)\", nil) {\n\t\t\tif perform.Verbose {\n\t\t\t\tfmt.Println(\"DepCharge cancelled.\")\n\t\t\t}\n\t\t\tos.Exit(0)\n\t\t}\n\t\t// If no labels, and only kind, return that.\n\t\treturn deps\n\t}\n\n\tlabels := strings.Split(perform.Labels, \",\")\n\n\tvar foundDeps []dep\n\tfor _, dep := range deps { // Cycle through all of the deps\n\n\t\tvar match bool\n\t\tif perform.Exclusive {\n\t\t\tmatch = isExclusive(dep.Labels, labels)\n\t\t} else {\n\t\t\tmatch = isInclusive(dep.Labels, labels)\n\t\t}\n\n\t\tif match {\n\t\t\tfoundDeps = append(foundDeps, dep)\n\t\t}\n\t}\n\n\treturn foundDeps\n}", "title": "" }, { "docid": "d0427c924abdf55a2d01a9c6b1f5c73d", "score": "0.5042318", "text": "func (l *LabelFilterVisitor) Visit(node promql.Node, path []promql.Node) (w promql.Visitor, err error) {\n\tswitch nodeTyped := node.(type) {\n\tcase *promql.VectorSelector:\n\t\tfor _, matcher := range nodeTyped.LabelMatchers {\n\t\t\tif matcher.Name == model.MetricNameLabel && matcher.Type == labels.MatchEqual {\n\t\t\t\tnodeTyped.Name = matcher.Value\n\t\t\t}\n\t\t}\n\n\t\tfilteredMatchers, ok := FilterMatchers(l.ls, nodeTyped.LabelMatchers)\n\t\tl.filterMatch = l.filterMatch && ok\n\n\t\tif ok {\n\t\t\tnodeTyped.LabelMatchers = filteredMatchers\n\t\t} else {\n\t\t\treturn nil, nil\n\t\t}\n\tcase *promql.MatrixSelector:\n\t\tfor _, matcher := range nodeTyped.LabelMatchers {\n\t\t\tif matcher.Name == model.MetricNameLabel && matcher.Type == labels.MatchEqual {\n\t\t\t\tnodeTyped.Name = matcher.Value\n\t\t\t}\n\t\t}\n\n\t\tfilteredMatchers, ok := FilterMatchers(l.ls, nodeTyped.LabelMatchers)\n\t\tl.filterMatch = l.filterMatch && ok\n\n\t\tif ok {\n\t\t\tnodeTyped.LabelMatchers = filteredMatchers\n\t\t} else {\n\t\t\treturn nil, nil\n\t\t}\n\t}\n\n\treturn l, nil\n}", "title": "" }, { "docid": "9dc3a0a9a537d2ea8ac2e1267233ec97", "score": "0.50290596", "text": "func (req Request) Matches(expr filter.Expression) (bool, error) {\n\tswitch e := expr.(type) {\n\tcase filter.PrefixExpression:\n\t\treturn req.matchPrefixExpr(e)\n\tcase filter.InfixExpression:\n\t\treturn req.matchInfixExpr(e)\n\tcase filter.StringLiteral:\n\t\treturn req.matchStringLiteral(e)\n\tdefault:\n\t\treturn false, fmt.Errorf(\"expression type (%T) not supported\", expr)\n\t}\n}", "title": "" }, { "docid": "7da638ad4dd03eecff5c5a41b41331ec", "score": "0.50247306", "text": "func MatchesFilter(jsonData, filter string) (bool, error) {\n\tin := C.CString(jsonData)\n\tf := C.CString(filter)\n\n\tresult := C.MatchesFilter(in, f)\n\tC.free(unsafe.Pointer(in))\n\tC.free(unsafe.Pointer(f))\n\n\tif result <= -1 {\n\t\treturn false, fmt.Errorf(\"error %d\", result)\n\t}\n\n\treturn result == 1, nil\n}", "title": "" }, { "docid": "aee2dc9847e3fdff9e9abbe3535dd2a0", "score": "0.5019762", "text": "func (ctrl *Controller) FindWithLabelFilter(c *gin.Context) {\n\tvar labels models.ComponentLabels\n\tif err := c.ShouldBindJSON(&labels); err != nil {\n\t\tc.AbortWithError(http.StatusBadRequest, err)\n\t\treturn\n\t}\n\n\tcomponents, err := ctrl.service.ListComponentsWithLabels(labels)\n\tif err != nil {\n\t\tc.AbortWithError(http.StatusInternalServerError, err)\n\t\treturn\n\n\t}\n\tc.JSON(http.StatusOK, components)\n\n}", "title": "" }, { "docid": "a236a4d90af3f784710264fef8633dab", "score": "0.5001986", "text": "func (lt *LessThanType) Match(match *Element, labels map[string]string) (bool, error) {\n\tif !isNumeric(match.Value) {\n\t\treturn false, fmt.Errorf(\"invalid lt oper with value: %v, should be number\", match.Value)\n\t}\n\n\tfrom := mustFloat64(match.Value)\n\n\tcompare, exists := labels[match.Key]\n\tif !exists {\n\t\treturn false, nil\n\t}\n\n\tto, err := strconv.ParseFloat(compare, 32)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"parse lt oper's target label value: %s to float failed, err: %v\", compare, err)\n\t}\n\n\treturn to < from, nil\n}", "title": "" }, { "docid": "4e47f80755b4f8748e69cdf3cd1b42dd", "score": "0.49985588", "text": "func (gt *GreaterThanType) Match(match *Element, labels map[string]string) (bool, error) {\n\tif !isNumeric(match.Value) {\n\t\treturn false, fmt.Errorf(\"invalid gt oper with value: %v, should be number\", match.Value)\n\t}\n\n\tfrom := mustFloat64(match.Value)\n\n\tcompare, exists := labels[match.Key]\n\tif !exists {\n\t\treturn false, nil\n\t}\n\n\tto, err := strconv.ParseFloat(compare, 32)\n\tif err != nil {\n\t\treturn false, fmt.Errorf(\"parse gt oper's target label value: %s to float failed, err: %v\", compare, err)\n\t}\n\n\treturn to > from, nil\n}", "title": "" }, { "docid": "a3398d23fc4f3ec374690b3e51b04347", "score": "0.49961933", "text": "func (f filter) Match(s string) bool {\n\ts = strings.ToLower(s)\n\n\tfuzzy := hasPrefixSuffix(s, \"[\", \"]\") || hasPrefixSuffix(s, \"{\", \"}\")\n\tfuzzy = fuzzy || f.Fuzzy\n\n\tmatch := (s == f.Val) || (fuzzy && strings.Contains(s, f.Val))\n\treturn f.Negate != match\n}", "title": "" }, { "docid": "1d78b4b40d807ddc0a4d3ea66539d581", "score": "0.4982005", "text": "func (df DomainFilter) Match(domain string) bool {\n\t// return always true, if not filter is specified\n\tif len(df.filters) == 0 {\n\t\treturn true\n\t}\n\n\tfor _, filter := range df.filters {\n\t\tstrippedDomain := strings.TrimSuffix(domain, \".\")\n\n\t\tif filter == \"\" {\n\t\t\treturn true\n\t\t} else if strings.HasPrefix(filter, \".\") && strings.HasSuffix(strippedDomain, filter) {\n\t\t\treturn true\n\t\t} else if strings.Count(strippedDomain, \".\") == strings.Count(filter, \".\") {\n\t\t\tif strippedDomain == filter {\n\t\t\t\treturn true\n\t\t\t}\n\t\t} else if strings.HasSuffix(strippedDomain, \".\"+filter) {\n\t\t\treturn true\n\t\t}\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "da8320d59c3e0b1f10480b2c6fcda38c", "score": "0.49819675", "text": "func (f Filter) Match(k, v string) (bool, error) {\n\tswitch f.Operator {\n\tcase \"=\":\n\t\tif strings.ToUpper(k) == strings.ToUpper(f.Key) && strings.ToUpper(v) == strings.ToUpper(f.Value) {\n\t\t\treturn true, nil\n\t\t}\n\tcase \"~\":\n\t\tif strings.ToUpper(k) == strings.ToUpper(f.Key) {\n\t\t\tr, err := regexp.Compile(f.Value)\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t\treturn r.Match([]byte(v)), nil\n\t\t}\n\tdefault:\n\t\treturn false, fmt.Errorf(\"unsupported operator %s\", f.Operator)\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "c5efabea30299a48b6cdc0b04a172dea", "score": "0.49760592", "text": "func matchFiltersets(lset labels.Labels, filtersets [][]*promlabels.Matcher) bool {\n\tfor _, fs := range filtersets {\n\t\tif matchFilterset(lset, fs) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "68862030a27b95bda9f9699ad0bad60d", "score": "0.49636084", "text": "func (po *PromOpts) checkLabel(label, pattern string) bool {\n\tif pattern == \"\" {\n\t\treturn true\n\t}\n\n\tmatched, err := regexp.MatchString(pattern, label)\n\tif err != nil {\n\t\treturn true\n\t}\n\treturn !matched\n}", "title": "" }, { "docid": "2d31a1f09a9a13e3552cc5de327bb9cb", "score": "0.49532777", "text": "func (o MetadataFilterOutput) FilterLabels() MetadataFilterLabelMatchArrayOutput {\n\treturn o.ApplyT(func(v MetadataFilter) []MetadataFilterLabelMatch { return v.FilterLabels }).(MetadataFilterLabelMatchArrayOutput)\n}", "title": "" }, { "docid": "f352ad242bc51d9c5f244c1dca827d96", "score": "0.49509662", "text": "func (e *enqueueRequestForSelector) namespaceMatches(in string, selector labels.Selector) bool {\n\tctx, cancel := context.WithTimeout(context.Background(), 500*time.Millisecond)\n\tdefer cancel()\n\n\tvar ns v1.Namespace\n\tif err := e.Client.Get(ctx, types.NamespacedName{Name: in}, &ns); err != nil {\n\t\tlevel.Error(e.Log).Log(\"msg\", \"failed to look up namespace\", \"namespace\", in, \"err\", err)\n\t\treturn false\n\t}\n\n\treturn selector.Matches(labels.Set(ns.Labels))\n}", "title": "" }, { "docid": "283f3fb58f592ab244e05348b2bb1fc2", "score": "0.49386886", "text": "func (app AzureApplicationInsightsApp) Ask(filter string) (bool, error) {\n\tsp := strings.SplitN(filter, \":\", 2)\n\tif len(sp) != 2 {\n\t\treturn false, fmt.Errorf(\"bad filter, filter must be in k:v format, got %v\", filter)\n\t}\n\tkey := strings.ToLower(sp[0]) // Make key case insensitive\n\tvalue := sp[1]\n\tswitch key {\n\tcase azureTagName:\n\t\tre, err := regexp.Compile(value)\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t\tif re.MatchString(app.ApplicationName) {\n\t\t\treturn true, nil\n\t\t}\n\tdefault:\n\t\tif tagV, ok := app.Tags[key]; ok {\n\t\t\tre, err := regexp.Compile(value)\n\t\t\tif err != nil {\n\t\t\t\treturn false, err\n\t\t\t}\n\t\t\tif re.MatchString(tagV) {\n\t\t\t\treturn true, nil\n\t\t\t}\n\t\t}\n\n\t}\n\treturn false, nil\n}", "title": "" }, { "docid": "c6c6cf71a28a605fa9861da690b972aa", "score": "0.49308437", "text": "func Match(prg cel.Program, data map[string]interface{}) (bool, error) {\n\tif prg == nil {\n\t\treturn true, nil\n\t}\n\tif data == nil {\n\t\treturn false, nil\n\t}\n\n\tout, details, err := prg.Eval(data)\n\tif err != nil {\n\t\tlog.Printf(\"failed to evaluate the expression: %v\", err)\n\t\treturn false, status.Errorf(codes.InvalidArgument, \"failed to evaluate filter: %v. Details: %+v\", err, details)\n\t}\n\tb, ok := out.Value().(bool)\n\tif !ok {\n\t\treturn false, status.Errorf(codes.InvalidArgument, \"expected boolean result, got %s\", out.Type().TypeName())\n\t}\n\treturn b, nil\n}", "title": "" }, { "docid": "4805ba12f8ee6c0dbf598fb9d03fda98", "score": "0.4930533", "text": "func matchFilter(filters []string, domain string, emptyval bool) bool {\n\tif len(filters) == 0 {\n\t\treturn emptyval\n\t}\n\n\tstrippedDomain := strings.ToLower(strings.TrimSuffix(domain, \".\"))\n\tfor _, filter := range filters {\n\t\tif filter == \"\" {\n\t\t\tcontinue\n\t\t}\n\n\t\tif strings.HasPrefix(filter, \".\") && strings.HasSuffix(strippedDomain, filter) {\n\t\t\treturn true\n\t\t} else if strings.Count(strippedDomain, \".\") == strings.Count(filter, \".\") {\n\t\t\tif strippedDomain == filter {\n\t\t\t\treturn true\n\t\t\t}\n\t\t} else if strings.HasSuffix(strippedDomain, \".\"+filter) {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "b297e8783ebf6481b79ca3f948466fea", "score": "0.49284962", "text": "func matchLabelKeysInUse(podSpec *api.PodSpec) bool {\n\tif podSpec == nil {\n\t\treturn false\n\t}\n\n\tfor _, c := range podSpec.TopologySpreadConstraints {\n\t\tif len(c.MatchLabelKeys) > 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "d4a1025b60ada47f2307f29fcc21e732", "score": "0.4920276", "text": "func (l *labelIdentitySelector) xxxMatches(labels labels.LabelArray) bool {\n\treturn l.selector.Matches(labels)\n}", "title": "" }, { "docid": "434e29e024091c720265abc5c218506f", "score": "0.4918007", "text": "func (s *bucketBlockSet) labelMatchers(matchers ...*labels.Matcher) ([]*labels.Matcher, bool) {\n\tres := make([]*labels.Matcher, 0, len(matchers))\n\n\tfor _, m := range matchers {\n\t\tv := s.labels.Get(m.Name)\n\t\tif v == \"\" {\n\t\t\tres = append(res, m)\n\t\t\tcontinue\n\t\t}\n\t\tif !m.Matches(v) {\n\t\t\treturn nil, false\n\t\t}\n\t}\n\treturn res, true\n}", "title": "" }, { "docid": "b5a197ae6e95c4e99b4532255f6f4815", "score": "0.4917664", "text": "func Matcher(label labels.Selector, field fields.Selector) generic.Matcher {\n\treturn &generic.SelectionPredicate{Label: label, Field: field, GetAttrs: getAttrs}\n}", "title": "" }, { "docid": "b5a197ae6e95c4e99b4532255f6f4815", "score": "0.4917664", "text": "func Matcher(label labels.Selector, field fields.Selector) generic.Matcher {\n\treturn &generic.SelectionPredicate{Label: label, Field: field, GetAttrs: getAttrs}\n}", "title": "" }, { "docid": "aa30bbe2f4b229d34040941a94b749ce", "score": "0.4879056", "text": "func TestLabelValidation(t *testing.T) {\n\ttestCases := []struct {\n\t\tstr string\n\t\tresult bool\n\t}{\n\t\t{\n\t\t\t\"a\",\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"1\",\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"a_a_k00293\",\n\t\t\ttrue,\n\t\t},\n\t\t{\n\t\t\t\"a???\",\n\t\t\tfalse,\n\t\t},\n\t}\n\tfor _, test := range testCases {\n\t\tif isLabelKeyValid(test.str) != test.result {\n\t\t\tt.Fatalf(\"%v\", test)\n\t\t}\n\t\tif isLabelValueValid(test.str) != test.result {\n\t\t\tt.Fatalf(\"%v\", test)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "8f10e5ab527d5a9752dbfee6069fbab0", "score": "0.48735788", "text": "func convertAliasFilterToLabelAnnotationFilter(aliasKey string, filterValue string, op ast.FilterOp) (ast.FilterNode, error) {\n\tlabelKey := ops.WithKey(afilter.FieldLabel, aliasKey)\n\tannotationKey := ops.WithKey(afilter.FieldAnnotation, aliasKey)\n\n\tvar labelOp ast.FilterNode\n\tvar annotationOp ast.FilterNode\n\n\t// This should only need to implement conversion for base-level ops like\n\t// equals, contains, etc.\n\tswitch op {\n\tcase ast.FilterOpEquals:\n\t\tlabelOp = ops.Eq(labelKey, filterValue)\n\t\tannotationOp = ops.Eq(annotationKey, filterValue)\n\tcase ast.FilterOpContains:\n\t\tlabelOp = ops.Contains(labelKey, filterValue)\n\t\tannotationOp = ops.Contains(annotationKey, filterValue)\n\tcase ast.FilterOpContainsPrefix:\n\t\tlabelOp = ops.ContainsPrefix(labelKey, filterValue)\n\t\tannotationOp = ops.ContainsPrefix(annotationKey, filterValue)\n\tcase ast.FilterOpContainsSuffix:\n\t\tlabelOp = ops.ContainsSuffix(labelKey, filterValue)\n\t\tannotationOp = ops.ContainsSuffix(annotationKey, filterValue)\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"unsupported op type '%s' for alias conversion\", op)\n\t}\n\n\t// This handles the case where a label EXISTS/IS PRESENT for (is extant)\n\t// for an aliased field. That's the primary case.\n\textantCaseNode := ops.Or(\n\t\tops.And(\n\t\t\tops.Contains(afilter.FieldLabel, aliasKey),\n\t\t\tlabelOp,\n\t\t),\n\t\tops.And(\n\t\t\tops.Not(ops.Contains(afilter.FieldLabel, aliasKey)),\n\t\t\tops.And(\n\t\t\t\tops.Contains(afilter.FieldAnnotation, aliasKey),\n\t\t\t\tannotationOp,\n\t\t\t),\n\t\t),\n\t)\n\tvar node ast.FilterNode\n\t// This handles the special case of unallocated aliased value. There's\n\t// two forms of this; first is where the label/annotation exists, but\n\t// has an empty string value. That's actually handled by the extant case,\n\t// because the API passes through that empty string. The other is when\n\t// the aliased label/annotation doesn't exist for an allocation. That's\n\t// what this modification to the tree handles. This matters when you're\n\t// trying to drill into/identify workloads \"not allocated\" within that\n\t// specific aliased field.\n\tif filterValue == \"\" || filterValue == UnallocatedSuffix {\n\t\tnode = ops.Or(\n\t\t\textantCaseNode,\n\t\t\tops.And(\n\t\t\t\tops.Not(ops.Contains(afilter.FieldLabel, aliasKey)),\n\t\t\t\tops.Not(ops.Contains(afilter.FieldAnnotation, aliasKey)),\n\t\t\t),\n\t\t)\n\t} else {\n\t\tnode = extantCaseNode\n\t}\n\n\treturn node, nil\n}", "title": "" }, { "docid": "0e31ba69714c60313a42e8dd56d40d58", "score": "0.48704913", "text": "func (c *predicateConditional) Matches(model model.Model) (bool, error) {\n\tret := reflect.ValueOf(c.predicate).Call([]reflect.Value{reflect.ValueOf(model)})\n\treturn ret[0].Bool(), nil\n}", "title": "" }, { "docid": "b68429001cfd01031a73c83da43f625c", "score": "0.48656616", "text": "func AddLabelMatchersToQuery(q string, labels []labels.Label) (newQ string, err error) {\n\tnewQ = \"\"\n\tdefer func() {\n\t\tif err2 := recover(); err2 != nil {\n\t\t\terr = errors.Errorf(\"Add labels matchers to query: %v\", err2)\n\t\t}\n\t}()\n\n\textraLbs := LabelsToString(labels)\n\t// all char are added to 'newQ' upto this position\n\tqPos := -1\n\n\tp := newParser(q)\n\titm := p.next()\n\tfor itm.typ != itemEOF {\n\t\tnextItm := p.next()\n\t\tif itm.typ == itemIdentifier || itm.typ == itemMetricIdentifier {\n\t\t\tif nextItm.typ != itemLeftParen { // to differential with function\n\t\t\t\tif nextItm.typ == itemLeftBrace { // http{} or http{method=\"get\"}\n\t\t\t\t\t// copy all 'q' char from 'qPos+1' to 'nextItm.Pos'\n\t\t\t\t\tnewQ = newQ + q[qPos+1:nextItm.pos+1]\n\t\t\t\t\tqPos = int(nextItm.pos)\n\t\t\t\t\texists := false // already labels exists or not, e.g. http{}, http{method=\"get\"}\n\t\t\t\t\tfor nextItm.typ != itemRightBrace && nextItm.typ != itemEOF {\n\t\t\t\t\t\tnextItm = p.next()\n\t\t\t\t\t\tif nextItm.typ == itemString || nextItm.typ == itemIdentifier {\n\t\t\t\t\t\t\texists = true\n\t\t\t\t\t\t}\n\t\t\t\t\t}\n\n\t\t\t\t\tnewQ = newQ + extraLbs\n\t\t\t\t\tif exists {\n\t\t\t\t\t\tnewQ = newQ + \",\"\n\t\t\t\t\t}\n\t\t\t\t} else { // http\n\t\t\t\t\t// copy all 'q' char from 'qPos+1' to 'itm.Pos + len(itm.val)'\n\t\t\t\t\ten := int(itm.pos) + len(itm.val)\n\t\t\t\t\tnewQ = newQ + q[qPos+1:en] + fmt.Sprintf(\"{%s}\", extraLbs)\n\t\t\t\t\tqPos = en - 1\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\tif itm.typ == itemLeftBrace { // handle case: {__name__=~\"job:.*\"}\n\t\t\texists := false // '__name__' exists\n\t\t\tfor nextItm.typ != itemRightBrace && nextItm.typ != itemEOF {\n\t\t\t\tif nextItm.typ == itemIdentifier && nextItm.val == model.MetricNameLabel {\n\t\t\t\t\texists = true\n\t\t\t\t}\n\t\t\t\tnextItm = p.next()\n\t\t\t}\n\n\t\t\tif exists {\n\t\t\t\t// copy all 'q' char from 'qPos+1' to 'itm.Pos'\n\t\t\t\tnewQ = newQ + q[qPos+1:itm.pos+1]\n\t\t\t\tqPos = int(itm.pos)\n\t\t\t\tnewQ = newQ + extraLbs + \",\"\n\t\t\t}\n\t\t}\n\n\t\tif itm.typ > keywordsStart && itm.typ < keywordsEnd {\n\t\t\tif nextItm.typ == itemLeftParen {\n\t\t\t\tfor nextItm.typ != itemRightParen && nextItm.typ != itemEOF {\n\t\t\t\t\tnextItm = p.next()\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\n\t\titm = nextItm\n\t}\n\n\tif qPos+1 < len(q) {\n\t\tnewQ = newQ + q[qPos+1:]\n\t}\n\n\tnewQ, err = RemoveDuplicateLabels(newQ, labels)\n\treturn newQ, err\n}", "title": "" }, { "docid": "c33294c1b610d2aacb771b9e5be9422e", "score": "0.48614153", "text": "func matchesLabels(a, b map[string]string) bool {\n\tfor k, v := range b {\n\t\tif a[k] != v {\n\t\t\treturn false\n\t\t}\n\t}\n\n\treturn true\n}", "title": "" }, { "docid": "add5e5d85d660402376adf1127ea6569", "score": "0.48515654", "text": "func (ls *Storage) filter(object runtime.Object, selector map[string]string) bool {\n\tfor key, value := range selector {\n\t\tif object.GetMetadata() == nil {\n\t\t\treturn false\n\t\t}\n\t\tif objectValue, exists := object.GetMetadata().Labels[key]; exists && value == objectValue {\n\t\t\tcontinue\n\t\t} else {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "65656fbebf64ab5d0b22cb21133c309a", "score": "0.484614", "text": "func (nin *NotInType) Match(match *Element, labels map[string]string) (bool, error) {\n\tvalues, ok := match.Value.([]interface{})\n\tif !ok {\n\t\treturn false, fmt.Errorf(\"invalid nin oper with value: %v, should be array string\", match.Value)\n\t}\n\n\tto, exists := labels[match.Key]\n\tif !exists {\n\t\treturn false, nil\n\t}\n\n\tfor _, val := range values {\n\t\tif val == to {\n\t\t\treturn false, nil\n\t\t}\n\t}\n\n\treturn true, nil\n}", "title": "" }, { "docid": "85748b2ee2c7a1748986fc54a90e50c9", "score": "0.4843899", "text": "func Equals(expected string) LabelMatcher {\n\treturn func(s string) bool {\n\t\treturn expected == s\n\t}\n}", "title": "" }, { "docid": "977d3dd7c1144c880aa5ffbf7a68f443", "score": "0.484284", "text": "func NewVTagLabelFilter(labels []string) Filter {\n\treturn &labelFilter{\n\t\tlabels: labels,\n\t}\n}", "title": "" }, { "docid": "73ab8ad87459f50db32b78df61224a71", "score": "0.4839188", "text": "func (g *genFitask) Filter(c *generator.Context, t *types.Type) bool { return t == g.typeToMatch }", "title": "" }, { "docid": "1619ddd7609394263a7ac7c5930fdbf6", "score": "0.48329955", "text": "func LabelsEqual(prefix string, spec, actual map[string]string) []Diff {\n\tvar result []Diff\n\tfor sk, sv := range spec {\n\t\tav := actual[sk]\n\t\tif sv != av {\n\t\t\tresult = append(result, Diff(fmt.Sprintf(\"%s.%s expected '%s' got '%s'\", prefix, sk, sv, av)))\n\t\t}\n\t}\n\treturn result\n}", "title": "" }, { "docid": "055cf12ba97cda1febb4bfe54a666a61", "score": "0.482573", "text": "func (h *hawkularProvider) labelSelectorToHawkularTagsQuery(selector labels.Selector) string {\n\treqs, selectable := selector.Requirements()\n\tif !selectable {\n\t\treturn \"\"\n\t}\n\n\tqueries := make([]string, 0, len(reqs))\n\t// postReq := make([]selector.Requirement)\n\n\tfor _, req := range reqs {\n\t\tkey := fmt.Sprintf(\"%s%s\", h.labelPrefix, req.Key())\n\t\tswitch req.Operator() {\n\t\tcase selection.In:\n\t\t\tqueries = append(queries, fmt.Sprintf(\"%s IN [%s]\", key, quoteValues(req.Values())))\n\t\tcase selection.NotIn:\n\t\t\tqueries = append(queries, fmt.Sprintf(\"%s NOT IN [%s]\", key, quoteValues(req.Values())))\n\t\tcase selection.Equals, selection.DoubleEquals:\n\t\t\t// More than one value would make no sense, use IN\n\t\t\tqueries = append(queries, fmt.Sprintf(\"%s = '%s'\", key, req.Values().List()[0]))\n\t\tcase selection.DoesNotExist:\n\t\t\tqueries = append(queries, fmt.Sprintf(\"NOT %s\", key))\n\t\tcase selection.NotEquals:\n\t\t\t// More than one value would make no sense, use NOT IN\n\t\t\tqueries = append(queries, fmt.Sprintf(\"%s != '%s'\", key, req.Values().List()[0]))\n\t\tcase selection.Exists:\n\t\t\tqueries = append(queries, req.Key())\n\t\tcase selection.GreaterThan, selection.LessThan:\n\t\t\t// These are not supported (Hawkular tags are string typed), need manual filtering\n\t\t\t// We could return a function for \"post-processing\" that would be run after fetching the definitions?\n\t\t\t// postReq = append(postReq, req)\n\t\t}\n\t}\n\n\treturn strings.Join(queries, \" AND \")\n}", "title": "" }, { "docid": "6442d07796f7e58042ccc90f1712bbcf", "score": "0.4824591", "text": "func (s internalSelector) Matches(l labels.Labels) bool {\n\tfor ix := range s {\n\t\tif matches := s[ix].Matches(l); !matches {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "7754659161f324560a6312d129221484", "score": "0.48228115", "text": "func (ms Matchers) Match(lset model.LabelSet) bool {\n\tfor _, m := range ms {\n\t\tif !m.Match(lset) {\n\t\t\treturn false\n\t\t}\n\t}\n\treturn true\n}", "title": "" }, { "docid": "fc469d468ea74402a241162a1119bbb2", "score": "0.4813451", "text": "func (m *Matcher) Matches(s string) bool {\n\tswitch m.Type {\n\tcase MatchEqual:\n\t\treturn s == m.Value\n\tcase MatchNotEqual:\n\t\treturn s != m.Value\n\tcase MatchRegexp:\n\t\treturn m.re.MatchString(s)\n\tcase MatchNotRegexp:\n\t\treturn !m.re.MatchString(s)\n\t}\n\tpanic(\"labels.Matcher.Matches: invalid match type\")\n}", "title": "" }, { "docid": "545e4c0b308b5fdcaabea016c56978e9", "score": "0.4807447", "text": "func FilterByEnableLabel(baseFilter t.Filter) t.Filter {\n\treturn func(c t.FilterableContainer) bool {\n\t\t// If label filtering is enabled, containers should only be considered\n\t\t// if the label is specifically set.\n\t\t_, ok := c.Enabled()\n\t\tif !ok {\n\t\t\treturn false\n\t\t}\n\n\t\treturn baseFilter(c)\n\t}\n}", "title": "" }, { "docid": "0454c4655113dcea9f95e5c812d98c4c", "score": "0.48047003", "text": "func MatchResourceLabels(selectors []Selector, resource types.ResourceWithLabels) bool {\n\tfor _, selector := range selectors {\n\t\tif len(selector.MatchLabels) == 0 {\n\t\t\treturn false\n\t\t}\n\t\tmatch, _, err := MatchLabels(selector.MatchLabels, resource.GetAllLabels())\n\t\tif err != nil {\n\t\t\tlogrus.WithError(err).Errorf(\"Failed to match labels %v: %v.\",\n\t\t\t\tselector.MatchLabels, resource)\n\t\t\treturn false\n\t\t}\n\t\tif match {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "059d8279850fed4411b94a20c030c378", "score": "0.47875085", "text": "func getStackIDFromLabelFilter(args filters.Args) (string, bool) {\n\tlabelfilters := args.Get(\"label\")\n\t// there should only be 1 string here, anything else is not supported\n\tif len(labelfilters) != 1 {\n\t\treturn \"\", false\n\t}\n\n\t// we now have a filter that is in one of two forms:\n\t// SomeKey or SomeKey=SomeValue\n\t// We split on the =. If we get 1 string back, it means there is no =, and\n\t// therefore no value specified for the label.\n\tkvPair := strings.SplitN(labelfilters[0], \"=\", 2)\n\tif len(kvPair) != 2 {\n\t\treturn \"\", false\n\t}\n\n\t// make sure the key is StackLabel\n\tif kvPair[0] != types.StackLabel {\n\t\treturn \"\", false\n\t}\n\n\t// don't return true if the value is emptystring. there's no reason\n\t// emptystring wouldn't be a valid, except that i'm pretty sure allowing it\n\t// to be a valid ID in this context would invite bugs.\n\tif kvPair[1] == \"\" {\n\t\treturn \"\", false\n\t}\n\n\treturn kvPair[1], true\n}", "title": "" }, { "docid": "1910af1332b28b5f2112466555d37ca9", "score": "0.47750294", "text": "func filterSnapshotCRsWithLabel(snapshotCRs []longhornclient.SnapshotCR, labelKey, labelValue string) []longhornclient.SnapshotCR {\n\treturn filterSnapshotCRs(snapshotCRs, func(snapshotCR longhornclient.SnapshotCR) bool {\n\t\tsnapshotLabelValue, found := snapshotCR.Labels[labelKey]\n\t\treturn found && labelValue == snapshotLabelValue\n\t})\n}", "title": "" }, { "docid": "a6854450a5dd599c65c613f794c5213a", "score": "0.4753214", "text": "func (c *ContainsOp) Match(match interface{}, with interface{}) (bool, error) {\n\tm, ok := match.(string)\n\tif !ok {\n\t\treturn false, errors.New(\"invalid parameter\")\n\t}\n\n\tw, ok := with.(string)\n\tif !ok {\n\t\treturn false, errors.New(\"invalid parameter\")\n\t}\n\n\treturn strings.Contains(m, w), nil\n}", "title": "" }, { "docid": "8ca838f9343e6865c22093d01ce29cee", "score": "0.47228372", "text": "func filterLabelRules(dnfConditions []MAPL_engine.ANDConditions, sender_receiver int) (dnfCondtions_out []MAPL_engine.ANDConditions) {\n\n\tfor _, andCondition := range (dnfConditions) {\n\t\tandCondition_temp := MAPL_engine.ANDConditions{}\n\t\tfor _, condition := range (andCondition.ANDConditions) {\n\n\t\t\tif sender_receiver == 1 {\n\t\t\t\tif !condition.AttributeIsSenderLabel {\n\t\t\t\t\tcondition.Attribute = \"true\" // ignore non-relevant conditions\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif sender_receiver == 2 {\n\t\t\t\tif !condition.AttributeIsReceiverLabel {\n\t\t\t\t\tcondition.Attribute = \"true\" // ignore non-relevant conditions\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif sender_receiver == 3 {\n\t\t\t\tif !condition.AttributeIsSenderLabel && !condition.AttributeIsReceiverLabel {\n\t\t\t\t\tcondition.Attribute = \"true\" // ignore non-relevant conditions\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tandCondition_temp.ANDConditions = append(andCondition_temp.ANDConditions, condition)\n\t\t}\n\t\tdnfCondtions_out = append(dnfCondtions_out, andCondition_temp)\n\t}\n\n\treturn dnfCondtions_out\n}", "title": "" }, { "docid": "a37d91860c0418bf9fe9748ea85d355a", "score": "0.4704004", "text": "func (o TopologySelectorTermOutput) MatchLabelExpressions() TopologySelectorLabelRequirementArrayOutput {\n\treturn o.ApplyT(func(v TopologySelectorTerm) []TopologySelectorLabelRequirement { return v.MatchLabelExpressions }).(TopologySelectorLabelRequirementArrayOutput)\n}", "title": "" }, { "docid": "37d41ea7c6c00b5ea91f2d9584edf44d", "score": "0.46851623", "text": "func (f *FilterMatcher) Matches() bool {\n\tfor _, m := range f.matcher {\n\t\tmatches, _ := regexp.MatchString(m, f.text)\n\t\tif matches {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" } ]
44a4f479d8702f1b250b2910bf6b17cc
Transfer initiates a plain transaction to move funds to the contract, calling its default method if one is available.
[ { "docid": "6dd9e29aca3faad7d4b26fe07a81cfdd", "score": "0.0", "text": "func (_KNS *KNSRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _KNS.Contract.KNSTransactor.contract.Transfer(opts)\n}", "title": "" } ]
[ { "docid": "a9fbe45302e463879260664fa7f2b45e", "score": "0.7362061", "text": "func (_ApproveAndCallFallBack *ApproveAndCallFallBackTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ApproveAndCallFallBack.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "3d2de41b574798e316c407cf87dd105f", "score": "0.7176193", "text": "func (_SimpleSavingsWallet *SimpleSavingsWalletTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _SimpleSavingsWallet.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "bbad0a46b8cb1b5cde7ca8b11b84a280", "score": "0.7141616", "text": "func (_Dospayment *DospaymentTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Dospayment.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "57ceed356ce2b95ddb4b5a517cbeaca3", "score": "0.713298", "text": "func (_ApproveAndCallFallBack *ApproveAndCallFallBackRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ApproveAndCallFallBack.Contract.ApproveAndCallFallBackTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "97eb95406b7bfbe71ce3df269f3c8cd6", "score": "0.7115623", "text": "func (_ZKOnacci *ZKOnacciTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ZKOnacci.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "f8bbc6872d7b8b90c19343c42b03666d", "score": "0.7063476", "text": "func (_Flytrap *FlytrapTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Flytrap.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4f3c62fecfa62993bf910f1494c86821", "score": "0.705774", "text": "func (_IndividuallyCappedCrowdsaleImpl *IndividuallyCappedCrowdsaleImplTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _IndividuallyCappedCrowdsaleImpl.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "3a31d605afb407134c399cb69577ea0e", "score": "0.7055439", "text": "func (_Caller *CallerTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Caller.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "f1ffa6f0f45d2a0e33fcc5096adc75c8", "score": "0.7049195", "text": "func (_TransferHelper *TransferHelperTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\r\n\treturn _TransferHelper.Contract.contract.Transfer(opts)\r\n}", "title": "" }, { "docid": "ea1fc264660811457ea75819d405bc10", "score": "0.70480835", "text": "func (_Crowdsale *CrowdsaleTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Crowdsale.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4e501ea8567817719145ce23c451e45d", "score": "0.7043053", "text": "func (_StaticCallProxy *StaticCallProxyTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _StaticCallProxy.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "95f12344109511de17454977c41cecf4", "score": "0.7040911", "text": "func (_Superuserable *SuperuserableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Superuserable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4bf07b47b151e2633c355224f2277854", "score": "0.7040766", "text": "func (_Depositmanager *DepositmanagerTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Depositmanager.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "6835491ee430dbb91d10b2f877b843a4", "score": "0.7024548", "text": "func (_TestClient *TestClientTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _TestClient.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "feee00eb42eb9782e94b8a2281a9c155", "score": "0.7021155", "text": "func (_SimpleSavingsWallet *SimpleSavingsWalletRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _SimpleSavingsWallet.Contract.SimpleSavingsWalletTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "a6825b7d03817205947bc8a09f9a9d37", "score": "0.70125645", "text": "func (_PaymentContract *PaymentContractTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _PaymentContract.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4e459abca088b51858112fb67d4b45e0", "score": "0.7009603", "text": "func (_Fibonacci *FibonacciTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Fibonacci.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "c6221e23b0ec15e670f4a483aab5bb07", "score": "0.7008364", "text": "func (_ERC20Interface *ERC20InterfaceTransactor) Transfer(opts *bind.TransactOpts, to common.Address, tokens *big.Int) (*types.Transaction, error) {\n\treturn _ERC20Interface.contract.Transact(opts, \"transfer\", to, tokens)\n}", "title": "" }, { "docid": "f80d69db542167c7945ebb2d95815c23", "score": "0.69981533", "text": "func (_ProjectWallet *ProjectWalletTransactor) Transfer(opts *bind.TransactOpts, _receiver common.Address, _amt *big.Int) (*types.Transaction, error) {\n\treturn _ProjectWallet.contract.Transact(opts, \"transfer\", _receiver, _amt)\n}", "title": "" }, { "docid": "1e841967fa4b1e5ba95f4cf4b22081cd", "score": "0.6993912", "text": "func (_FinalizableCrowdsaleImpl *FinalizableCrowdsaleImplTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _FinalizableCrowdsaleImpl.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "0b235c44a62417bbe1e4ca956df0edc9", "score": "0.69908917", "text": "func (_Crowdsale *CrowdsaleRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Crowdsale.Contract.CrowdsaleTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "e7be469a4c02bc2edc2c1bacc45392f5", "score": "0.698687", "text": "func (_Contracts *ContractsTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contracts.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "3def8389ffbb76d16f3eadb3f6d88090", "score": "0.6986242", "text": "func (_Flopper *FlopperTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Flopper.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "2c110501d58a20980f93fc01f7ce383b", "score": "0.6982951", "text": "func (_Foo *FooTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Foo.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "e0b21a8665c53c8d506ab802a50e7121", "score": "0.697852", "text": "func (_ERC20Basic *ERC20BasicTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ERC20Basic.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "e0b21a8665c53c8d506ab802a50e7121", "score": "0.697852", "text": "func (_ERC20Basic *ERC20BasicTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ERC20Basic.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "c298924353ccdd2929aab034a757e048", "score": "0.6978383", "text": "func (_Console *ConsoleTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Console.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "037c9bcc90ec4257e73732bc601cf2ee", "score": "0.6976218", "text": "func (_Casper *CasperTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Casper.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4466313afe315168c1e7c259fd346b44", "score": "0.6974097", "text": "func (_ZeroCopySource *ZeroCopySourceTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ZeroCopySource.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "b8939e505c4e94e98c91621fff36d2ed", "score": "0.6972885", "text": "func (_ERC20Basic *ERC20BasicTransactor) Transfer(opts *bind.TransactOpts, to common.Address, value *big.Int) (*types.Transaction, error) {\n\treturn _ERC20Basic.contract.Transact(opts, \"transfer\", to, value)\n}", "title": "" }, { "docid": "b8939e505c4e94e98c91621fff36d2ed", "score": "0.6972885", "text": "func (_ERC20Basic *ERC20BasicTransactor) Transfer(opts *bind.TransactOpts, to common.Address, value *big.Int) (*types.Transaction, error) {\n\treturn _ERC20Basic.contract.Transact(opts, \"transfer\", to, value)\n}", "title": "" }, { "docid": "4e11a8a4a6d2c7ee33caa4491a1b9f12", "score": "0.6970181", "text": "func (_TestABI *TestABITransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _TestABI.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "bf72a6061f3ceb160b78a4489a62cf86", "score": "0.6969813", "text": "func (_Governable *GovernableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Governable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "fa41437ee351f8e45dca7a09d2cebfea", "score": "0.6969024", "text": "func (_DevUtils *DevUtilsTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _DevUtils.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "704c0ab494459eec91a4bbdc240f2c0c", "score": "0.69654226", "text": "func (_Utils *UtilsTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Utils.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "704c0ab494459eec91a4bbdc240f2c0c", "score": "0.69654226", "text": "func (_Utils *UtilsTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Utils.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "c5c35da67517382c836ac91abe8b1013", "score": "0.6957628", "text": "func (_IOrakuruCore *IOrakuruCoreTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _IOrakuruCore.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "c302fbe96eb324357fd55ebe37790716", "score": "0.6951821", "text": "func (_Cakevault *CakevaultTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Cakevault.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "2ca87cabb81c5e39c96bc16afd53f2a9", "score": "0.69498837", "text": "func (_EthCrossChain *EthCrossChainTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _EthCrossChain.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "220b5307018750b751901d90dac7dab2", "score": "0.69473934", "text": "func (_MainnetCryptoCardsContract *MainnetCryptoCardsContractTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _MainnetCryptoCardsContract.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "651632a34a68618175d08d545053f86e", "score": "0.69438297", "text": "func (_HelloWorld *HelloWorldTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, *types.Receipt, error) {\n\treturn _HelloWorld.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "a4a955e4d6b964ba4b7e26b6c47dd6f2", "score": "0.693785", "text": "func (_Presale *PresaleTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Presale.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4f719cc37b2481f76df86fa3b100fc91", "score": "0.6935794", "text": "func (_InboxHelperTester *InboxHelperTesterTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _InboxHelperTester.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "023bf4d0110fc3cf81bedac6f276321f", "score": "0.6935634", "text": "func (_Ownable *OwnableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Ownable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "023bf4d0110fc3cf81bedac6f276321f", "score": "0.6935634", "text": "func (_Ownable *OwnableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Ownable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "023bf4d0110fc3cf81bedac6f276321f", "score": "0.6935634", "text": "func (_Ownable *OwnableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Ownable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "023bf4d0110fc3cf81bedac6f276321f", "score": "0.6935634", "text": "func (_Ownable *OwnableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Ownable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "abcfe732a83fb634fb95f1823102cc8b", "score": "0.6935002", "text": "func (_Dospayment *DospaymentRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Dospayment.Contract.DospaymentTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "bf46af8ba84e974ea6d1d48b33979b5b", "score": "0.69329846", "text": "func (_Upgradeable *UpgradeableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Upgradeable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "c67f51f0035bb6a5fc5f5edfb569e6e9", "score": "0.69327086", "text": "func (_IncreasingPriceCrowdsaleImpl *IncreasingPriceCrowdsaleImplTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _IncreasingPriceCrowdsaleImpl.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "6aa36243d7e875b8e0f9365c15bd090b", "score": "0.693221", "text": "func (_IndividuallyCappedCrowdsaleImpl *IndividuallyCappedCrowdsaleImplRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _IndividuallyCappedCrowdsaleImpl.Contract.IndividuallyCappedCrowdsaleImplTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "424227198b177888b9b8f92af9d4ed39", "score": "0.6930499", "text": "func (_Contracts *ContractsRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contracts.Contract.ContractsTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4d5ff3982e8eb312fff96f8b89b01431", "score": "0.69290054", "text": "func (_Abi *AbiTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Abi.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "696813aacd9b06804276dd152ec3bf0c", "score": "0.69280475", "text": "func (_SimpleStorage *SimpleStorageTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _SimpleStorage.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "99dcd8e37321536398ccc62d6f44e78a", "score": "0.69276285", "text": "func (_DelegatableDai *DelegatableDaiTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _DelegatableDai.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "886779e3b4833b16a6808632990d4a95", "score": "0.69242203", "text": "func (_ERC20Interface *ERC20InterfaceTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ERC20Interface.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "886779e3b4833b16a6808632990d4a95", "score": "0.69242203", "text": "func (_ERC20Interface *ERC20InterfaceTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ERC20Interface.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4a2efba20c4997f18cd15a294d2004e5", "score": "0.692172", "text": "func (_Weth *WethTransactor) Transfer(opts *bind.TransactOpts, recipient common.Address, amount *big.Int) (*types.Transaction, error) {\n\treturn _Weth.contract.Transact(opts, \"transfer\", recipient, amount)\n}", "title": "" }, { "docid": "257d42b0bc7d3aea5f1660fd39754f80", "score": "0.69182533", "text": "func (_ERC20Interface *ERC20InterfaceTransactor) Transfer(opts *bind.TransactOpts, _to common.Address, _value *big.Int) (*types.Transaction, error) {\n\treturn _ERC20Interface.contract.Transact(opts, \"transfer\", _to, _value)\n}", "title": "" }, { "docid": "4e5c59bd90191c148db33d19f8f039d6", "score": "0.69119954", "text": "func (_Pausable *PausableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Pausable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4e5c59bd90191c148db33d19f8f039d6", "score": "0.69119954", "text": "func (_Pausable *PausableTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Pausable.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4169c0f90ed36ffa957167149822b654", "score": "0.6911675", "text": "func (_Bindings *BindingsTransactor) Transfer(opts *bind.TransactOpts, dst common.Address, amount *big.Int) (*types.Transaction, error) {\n\treturn _Bindings.contract.Transact(opts, \"transfer\", dst, amount)\n}", "title": "" }, { "docid": "ba8c330a64f9837b97f6ac48cd3c6865", "score": "0.6909016", "text": "func (_Transfer *TransferTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Transfer.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "ff88e6d7b4e500d4c5d3725b0ee85fe1", "score": "0.69053996", "text": "func (_ProjectWalletAuthoriser *ProjectWalletAuthoriserTransactor) Transfer(opts *bind.TransactOpts, _sender common.Address, _receiver common.Address, _amt *big.Int) (*types.Transaction, error) {\n\treturn _ProjectWalletAuthoriser.contract.Transact(opts, \"transfer\", _sender, _receiver, _amt)\n}", "title": "" }, { "docid": "f290ea14317b7dd8eb576a034cb6a42f", "score": "0.6893351", "text": "func (_EventExample *EventExampleTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _EventExample.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "da08b3454f4d5b3a4c15aa2160e85f41", "score": "0.68922746", "text": "func (_PaymentContract *PaymentContractRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _PaymentContract.Contract.PaymentContractTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "c3c12734320ff830649390f5c6e93923", "score": "0.68907624", "text": "func (_SushiV2Factory *SushiV2FactoryTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _SushiV2Factory.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "4e13af19999ed9c5b497c230599717de", "score": "0.6886611", "text": "func (_ProjectWallet *ProjectWalletTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ProjectWallet.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "366c887c2fc2827400a32556b572dd48", "score": "0.6886446", "text": "func (_Vault *VaultTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Vault.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "d60a530f588ffc574ddffa5165010803", "score": "0.6885806", "text": "func (_Bindings *BindingsTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Bindings.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "c18821ed38f86069b2d29960ffc1625a", "score": "0.6885341", "text": "func (_Ethdkg *EthdkgTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Ethdkg.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "63d2ac4eed3f3c6dd64344a40035ea39", "score": "0.6884868", "text": "func (_ERC20 *ERC20Transactor) Transfer(opts *bind.TransactOpts, recipient common.Address, amount *big.Int) (*types.Transaction, error) {\n\treturn _ERC20.contract.Transact(opts, \"transfer\", recipient, amount)\n}", "title": "" }, { "docid": "451e399c672f021786d0e6d8642ed3ea", "score": "0.68847793", "text": "func (_TTFT20 *TTFT20TransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _TTFT20.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "81940c6443e0683f96a01c7b872347d7", "score": "0.6884433", "text": "func (_Flytrap *FlytrapRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Flytrap.Contract.FlytrapTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "5f111890367e852b587bd7fdb120cd21", "score": "0.6878585", "text": "func (_Smartchef *SmartchefTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Smartchef.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "33227a57374ba63eb0b7f09cfb886d71", "score": "0.6877819", "text": "func (_TTFT20 *TTFT20Transactor) Transfer(opts *bind.TransactOpts, to common.Address, tokens *big.Int) (*types.Transaction, error) {\n\treturn _TTFT20.contract.Transact(opts, \"transfer\", to, tokens)\n}", "title": "" }, { "docid": "0b08500d382183ba46599bca6ec6af3c", "score": "0.68760514", "text": "func (_ERC721Contract *ERC721ContractRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ERC721Contract.Contract.ERC721ContractTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "3f78146921cf45f6b70562e189306760", "score": "0.68751657", "text": "func (_Contract *ContractTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "3f78146921cf45f6b70562e189306760", "score": "0.68751657", "text": "func (_Contract *ContractTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "3f78146921cf45f6b70562e189306760", "score": "0.68751657", "text": "func (_Contract *ContractTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "3f78146921cf45f6b70562e189306760", "score": "0.68751657", "text": "func (_Contract *ContractTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "3f78146921cf45f6b70562e189306760", "score": "0.68751657", "text": "func (_Contract *ContractTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "8a1bcfd3eeddf2613dedaf2a1d7a7beb", "score": "0.68740636", "text": "func (_DemoERC20 *DemoERC20TransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _DemoERC20.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "8a1bcfd3eeddf2613dedaf2a1d7a7beb", "score": "0.68740636", "text": "func (_DemoERC20 *DemoERC20TransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _DemoERC20.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "ffedbb075731b8cbb6437b302f27e010", "score": "0.6871751", "text": "func (_FCToken *FCTokenTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _FCToken.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "a94dad5f9201c2e95d5a91d3c6349b5e", "score": "0.68711543", "text": "func (_XStaking *XStakingTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _XStaking.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "e17fa78483826895c1ca462f7a9e5ea0", "score": "0.68661594", "text": "func (_Pairing *PairingTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Pairing.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "b7beef76192bac4e92ba91a17f462fbf", "score": "0.6858173", "text": "func (_Aicumen *AicumenTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Aicumen.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "d2a114733a77a34a7f1d67b5362c0d39", "score": "0.6857494", "text": "func (_GovernmentContract *GovernmentContractTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _GovernmentContract.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "7cff7eae829e63ab855b9019fbd528ae", "score": "0.6856047", "text": "func (_ValueTester *ValueTesterTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _ValueTester.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "a7d383ce130dc3ca29b4ecd6b694c307", "score": "0.68539464", "text": "func (_Contract *ContractRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.ContractTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "a7d383ce130dc3ca29b4ecd6b694c307", "score": "0.68539464", "text": "func (_Contract *ContractRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.ContractTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "a7d383ce130dc3ca29b4ecd6b694c307", "score": "0.68539464", "text": "func (_Contract *ContractRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.ContractTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "a7d383ce130dc3ca29b4ecd6b694c307", "score": "0.68539464", "text": "func (_Contract *ContractRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.ContractTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "a7d383ce130dc3ca29b4ecd6b694c307", "score": "0.68539464", "text": "func (_Contract *ContractRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Contract.Contract.ContractTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "beee95e2f1a943431f6407a3136eff9b", "score": "0.6853239", "text": "func (_DelegatableDai *DelegatableDaiTransactor) Transfer(opts *bind.TransactOpts, _to common.Address, _value *big.Int) (*types.Transaction, error) {\n\treturn _DelegatableDai.contract.Transact(opts, \"transfer\", _to, _value)\n}", "title": "" }, { "docid": "e9daf304c9b59f721483d52c92ff558d", "score": "0.68528646", "text": "func (_InboxHelper *InboxHelperTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _InboxHelper.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "691615d9fdf4f2568443575cd7fac74c", "score": "0.68522424", "text": "func (_Eth *EthTransactorRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _Eth.Contract.contract.Transfer(opts)\n}", "title": "" }, { "docid": "92bd29f0c4837c72f815c2abd8d48600", "score": "0.68507534", "text": "func (_MainnetCryptoCardsContract *MainnetCryptoCardsContractRaw) Transfer(opts *bind.TransactOpts) (*types.Transaction, error) {\n\treturn _MainnetCryptoCardsContract.Contract.MainnetCryptoCardsContractTransactor.contract.Transfer(opts)\n}", "title": "" }, { "docid": "1303e7c0d3d11c56e9f7945d6feca587", "score": "0.6850621", "text": "func (_IERC20 *IERC20Transactor) Transfer(opts *bind.TransactOpts, recipient common.Address, amount *big.Int) (*types.Transaction, error) {\n\treturn _IERC20.contract.Transact(opts, \"transfer\", recipient, amount)\n}", "title": "" }, { "docid": "1303e7c0d3d11c56e9f7945d6feca587", "score": "0.6850621", "text": "func (_IERC20 *IERC20Transactor) Transfer(opts *bind.TransactOpts, recipient common.Address, amount *big.Int) (*types.Transaction, error) {\n\treturn _IERC20.contract.Transact(opts, \"transfer\", recipient, amount)\n}", "title": "" } ]
c4db9f395e36a71ef83b5e771e6377ab
Indicates whether or not to export logs. This is false by default, which means no health check logging will be done.
[ { "docid": "d0fe1b62476db40345f02c5bc89eb262", "score": "0.0", "text": "func (o RegionHealthCheckLogConfigPtrOutput) Enable() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *RegionHealthCheckLogConfig) *bool {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Enable\n\t}).(pulumi.BoolPtrOutput)\n}", "title": "" } ]
[ { "docid": "389f5902b6dcb6eb5a2ca464898d57bd", "score": "0.564781", "text": "func logToStdoutBasedOnEnv() bool {\n\treturn isDocker() && !isJail()\n}", "title": "" }, { "docid": "0072d1d10b52ab11eeb3d8654802674f", "score": "0.5525433", "text": "func (s *Sender) Logging() bool { return s.logging }", "title": "" }, { "docid": "3605131988af42fdd95f3a78bb7dfb40", "score": "0.55001783", "text": "func (c *Container) ProducingLogs() bool {\n\treturn c.Container.State == \"running\" && c.DetailsLoaded() && c.Details.HostConfig.LogConfig.Type != \"none\"\n}", "title": "" }, { "docid": "0f74912c83df797cf144d2d57f8a1759", "score": "0.5417909", "text": "func (c *Config) Logging() bool {\n\treturn c.LogMode\n}", "title": "" }, { "docid": "d7d1dde42358d7ed7b94b38ff6099653", "score": "0.5391894", "text": "func (c *Config) LogEnabled() bool {\n\treturn c.Log || c.LogFormatterEnabled()\n}", "title": "" }, { "docid": "903c0514a8517ed3821a87bda706e0fa", "score": "0.52793574", "text": "func (o GetEngineVersionResultOutput) SupportsLogExportsToCloudwatch() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v GetEngineVersionResult) bool { return v.SupportsLogExportsToCloudwatch }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "9c89df0a59960f0b1e7f80f05d4ba23e", "score": "0.51355404", "text": "func (o LookupWindowsFunctionAppResultOutput) BuiltinLoggingEnabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v LookupWindowsFunctionAppResult) bool { return v.BuiltinLoggingEnabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "4ab366da2035640bcba6c3e72e86a805", "score": "0.5130408", "text": "func (h handler) GetLogToFile() bool {\n\treturn logToFile\n}", "title": "" }, { "docid": "31d0b28805ef35cd40bf946d313d4702", "score": "0.5109218", "text": "func IsLogSharingEnabled() bool {\n\treturn logDataFacadeInstance.logSharingEnabled\n}", "title": "" }, { "docid": "8249680255499f0e94edc45616745266", "score": "0.50595933", "text": "func EnableLogOutput(output bool) {\n\tenableLogOutput = output\n}", "title": "" }, { "docid": "85ddc29eb7a4112635c8f62553083398", "score": "0.50349045", "text": "func (e *EmptyLogger) Enabled() bool {\n\treturn false\n}", "title": "" }, { "docid": "f91faf5741e45149c60a984054b2e67c", "score": "0.5021624", "text": "func EnableLogs() {\n\tSetLogger(log.New(os.Stdout, \"GGPO \", log.Ldate|log.Ltime|log.Lmsgprefix))\n}", "title": "" }, { "docid": "29c607ef70e7010530bf1409fda394b7", "score": "0.5018244", "text": "func (ts *Tester) DumpClusterLogs() error {\n\tif ts.cfg.IsEnabledAddOnNodeGroups() {\n\t\tif err := ts.ngTester.FetchLogs(); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tif ts.cfg.IsEnabledAddOnManagedNodeGroups() {\n\t\treturn ts.mngTester.FetchLogs()\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "026801b2b6e2f300a6c252a46bf1afe1", "score": "0.4943669", "text": "func init() {\n\tSetLogger(log.New(os.Stdout, \"\", log.LstdFlags), false)\n}", "title": "" }, { "docid": "4796c70f386ae1f185b47ca9c250cf53", "score": "0.49320972", "text": "func (o LookupFirewallResultOutput) EnableLogging() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v LookupFirewallResult) bool { return v.EnableLogging }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "0f37dacb45c0e28eb1b8eeaf3c630b06", "score": "0.4902401", "text": "func (indices *Indices) HasApplicationLogs() bool {\n\tfor _, index := range *indices {\n\t\tif strings.HasPrefix(index.Name, ProjectIndexPrefix) && index.DocCount() > 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "57878566140edf35228dc4ab0fb01116", "score": "0.48563486", "text": "func (o ConnectorFirehoseLogDeliveryOutput) Enabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ConnectorFirehoseLogDelivery) bool { return v.Enabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "0d9430f355633dc8abd36ff067531eb6", "score": "0.48367023", "text": "func (r *Container) Logs() pulumi.BoolOutput {\n\treturn (pulumi.BoolOutput)(r.s.State[\"logs\"])\n}", "title": "" }, { "docid": "86e924da4b443d933cc448bfa830b3a8", "score": "0.48348224", "text": "func (p *migrateLogger) Verbose() bool { return true }", "title": "" }, { "docid": "92909d677434682d562ac68b3b773dd4", "score": "0.4826352", "text": "func IsLoggingOn(key string) bool {\n\tresult, err := strconv.ParseBool(key)\n\tif err != nil {\n\t\tlog.Printf(\"IsLoggingOn could not parse %s\", key)\n\t\treturn false\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "d4d59f838f7c2e7e8c9f2abf00149325", "score": "0.48207805", "text": "func (o LookupInstanceResultOutput) EnableStackdriverLogging() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v LookupInstanceResult) bool { return v.EnableStackdriverLogging }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "df5b18cffaab68884eb9ef68807db71b", "score": "0.48190406", "text": "func (c *Config) LogFormatterEnabled() bool {\n\treturn c.LogFormatter != \"\"\n}", "title": "" }, { "docid": "d25c34107c3f2b64414eec37dd0f6d9d", "score": "0.48065862", "text": "func DisableLogging() {\n\tlogrus.SetOutput(ioutil.Discard)\n}", "title": "" }, { "docid": "2898ca8916361695b37b79e27952c23c", "score": "0.47788155", "text": "func (s *Sender) SetLogging(logging bool) { s.logging = logging }", "title": "" }, { "docid": "0ad8cc468c24423dcea4ab5e1861f75f", "score": "0.47603112", "text": "func (o ConnectorCloudWatchLogsLogDeliveryOutput) Enabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ConnectorCloudWatchLogsLogDelivery) bool { return v.Enabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "bdc7efca3b1347dbbb9b040038929520", "score": "0.4742048", "text": "func (a *api) ExportLogs(configParam ExportLogsConfig) (err error) {\n\n\tstartTime := time.Now().UTC()\n\t// time.RFC3339 = \"2006-01-02T15:04:05Z07:00\"\n\ttimeLabel := strings.Replace(startTime.Format(time.RFC3339), \":\", \"\", -1)\n\n\te := validateConfiguration(&configParam, timeLabel)\n\tif e != nil {\n\t\treturn e\n\t}\n\n\tvar exporter *logExporter\n\tdefer func() {\n\t\tif exporter != nil {\n\t\t\texporter.cleanup()\n\t\t}\n\t}()\n\n\texporter, e = buildExporter(configParam, startTime, timeLabel, a.GetAllServiceDetails, a.GetHostMap)\n\tif e != nil {\n\t\treturn e\n\t}\n\n\tnumWarnings := 0\n\tfoundIndexedDay := false\n\n\tlog := log.WithFields(logrus.Fields{\n\t\t\"tmpdir\": exporter.tempdir,\n\t\t\"from\": exporter.FromDate,\n\t\t\"to\": exporter.ToDate,\n\t})\n\tlog.Info(\"Starting part 1 of 3: Processing Logstash Elastic results\")\n\tfoundIndexedDay, numWarnings, e = exporter.retrieveLogs()\n\tif e != nil {\n\t\treturn e\n\t} else if !foundIndexedDay {\n\t\treturn fmt.Errorf(\"no logstash indexes exist for the given date range %s - %s\", exporter.FromDate, exporter.ToDate)\n\t}\n\n\tlog.WithFields(logrus.Fields{\n\t\t\"numfiles\": len(exporter.outputFiles),\n\t}).Info(\"Starting part 2 of 3: Sort output files\")\n\n\tindexData := []string{}\n\tfor i, outputFile := range exporter.outputFiles {\n\t\tif e := exporter.organizeAndGroomLogFile(i, numWarnings); e != nil {\n\t\t\treturn e\n\t\t}\n\t\tindexData = append(indexData, exporter.fileIndex.GetFileIndexData(\n\t\t\ti,\n\t\t\toutputFile,\n\t\t\texporter.getHostName(outputFile.HostID),\n\t\t\texporter.getServiceName(outputFile.ServiceID)))\n\t}\n\tsort.Strings(indexData)\n\n\tservicesDesc := make([]string, 0)\n\tfor _, id := range configParam.ServiceIDs {\n\t\tservicesDesc = append(servicesDesc, fmt.Sprintf(\"%s (%s)\", exporter.getServiceName(id), id))\n\t}\n\tindexData = append([]string{\n\t\t\"LOG EXPORT SUMMARY\",\n\t\tfmt.Sprintf(\" Export Ran On: %s\", exporter.startTime.Format(time.RFC1123)),\n\t\tfmt.Sprintf(\"Available Date Range: %s - %s\", exporter.days[len(exporter.days)-1], exporter.days[0]),\n\t\tfmt.Sprintf(\" Requested Dates: %s - %s\", configParam.FromDate, configParam.ToDate),\n\t\tfmt.Sprintf(\" Exported Dates: %s - %s\", exporter.minDateFound, exporter.maxDateFound),\n\t\tfmt.Sprintf(\" Grouped By: %s\", configParam.GroupBy),\n\t\tfmt.Sprintf(\"Requested Service(s): %s\", strings.Join(servicesDesc, \", \")),\n\t\tfmt.Sprintf(\"Child Svcs Excluded?: %s\", strconv.FormatBool(configParam.ExcludeChildren)),\n\t\tfmt.Sprintf(\" Requested File(s): %s\", strings.Join(configParam.FileNames, \", \")),\n\t\t\"\",\n\t\t\"INDEX OF LOG FILES\",\n\t\texporter.fileIndex.GetIndexHeader()},\n\t\tindexData...)\n\tindexData = append(indexData, \"\")\n\tindexFile := filepath.Join(exporter.tempdir, \"index.txt\")\n\te = ioutil.WriteFile(indexFile, []byte(strings.Join(indexData, \"\\n\")), 0644)\n\tif e != nil {\n\t\treturn fmt.Errorf(\"failed writing to %s: %s\", indexFile, e)\n\t}\n\n\tlog.WithFields(logrus.Fields{\n\t\t\"outfile\": exporter.OutFileName,\n\t}).Info(\"Starting part 3 of 3: Generate tar file\")\n\tgz := gzip.NewWriter(exporter.outFile)\n\tdefer gz.Close()\n\ttarfile := tar.NewWriter(gz)\n\tdefer tarfile.Close()\n\tif e := volume.ExportDirectory(tarfile, exporter.tempdir, filepath.Base(exporter.tempdir)); e != nil {\n\t\treturn fmt.Errorf(\"failed to write tgz %s: %s\", exporter.OutFileName, e)\n\t}\n\n\tif numWarnings != 0 {\n\t\tlog.WithFields(logrus.Fields{\n\t\t\t\"warnfile\": filepath.Join(filepath.Base(exporter.tempdir), filepath.Base(exporter.parseWarningsFilename)),\n\t\t}).Info(\"Warnings for log parse are included in the tar file\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "1ab33757483268412c1ee5ea3d0f007a", "score": "0.4737203", "text": "func (l *LogInfo) Export() model.LogInfo {\n\treturn model.LogInfo{\n\t\tProject: l.Project,\n\t\tVersion: l.Version,\n\t\tVariant: l.Variant,\n\t\tTaskName: l.TaskName,\n\t\tTaskID: l.TaskId,\n\t\tExecution: int(l.Execution),\n\t\tTestName: l.TestName,\n\t\tTrial: int(l.Trial),\n\t\tProcessName: l.ProcName,\n\t\tFormat: l.Format.Export(),\n\t\tTags: l.Tags,\n\t\tArguments: l.Arguments,\n\t\tMainline: l.Mainline,\n\t}\n}", "title": "" }, { "docid": "31edaf17113bcd1861176801432d5f52", "score": "0.47362298", "text": "func shouldDisableProgressAnimation() bool {\n\tswitch log.Level(os.Getenv(log.EnvLogLevel)) {\n\tcase log.LevelDebug:\n\t\treturn true\n\tcase log.LevelInfo:\n\t\treturn true\n\n\tdefault:\n\t\treturn false\n\t}\n}", "title": "" }, { "docid": "117666b5db1ba49e2ead11daaec0f1bb", "score": "0.47328252", "text": "func setupLogging(c *cli.Context) error {\n\tif c.GlobalBool(\"debug\") {\n\t\tlog.SetLevel(log.DebugLevel)\n\t}\n\n\t// Dynamically return false or true based on the logger output's\n\t// file descriptor referring to a terminal or not.\n\tif os.Getenv(\"TERM\") == \"dumb\" || !isLogrusTerminal() {\n\t\tlog.SetFormatter(log.Formatter(&log.JSONFormatter{}))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "0d82aad578d86b2b77cd37798b0f96b9", "score": "0.47068205", "text": "func Disable() {\n\tos.Setenv(\"DEBUG\", \"\")\n\tlogrus.SetLevel(logrus.InfoLevel)\n\tlogrus.SetFormatter(&nullFormat{})\n}", "title": "" }, { "docid": "af945c9172ab61b06021d1b809bc9831", "score": "0.4669507", "text": "func (k *kafkaRedoLogManager) IsAppendEnabled() bool {\n\treturn false\n}", "title": "" }, { "docid": "51a0310faa5c83b4f093b54b37bd7d8b", "score": "0.46623206", "text": "func buildExporter(configParam ExportLogsConfig, startTime time.Time, timeLabel string, getServices func() ([]service.ServiceDetails, error), getHostMap func() (map[string]host.Host, error)) (exporter *logExporter, err error) {\n\texporter = &logExporter{\n\t\tExportLogsConfig: configParam,\n\t\tstartTime: startTime,\n\t\ttimeLabel: timeLabel,\n\t}\n\n\texporter.query, err = exporter.buildQuery(getServices)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Could not build query: %s\", err)\n\t}\n\n\texporter.days, err = exporter.Driver.LogstashDays()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not determine range of days in the logstash repo: %s\", err)\n\t} else if exporter.Debug {\n\t\tlog.WithFields(logrus.Fields{\n\t\t\t\"ndays\": len(exporter.days),\n\t\t\t\"to\": exporter.days[0],\n\t\t\t\"from\": exporter.days[len(exporter.days)-1],\n\t\t}).Info(\"Found logs\")\n\t}\n\n\t// Get a temporary directory\n\texporter.tempdir, err = ioutil.TempDir(\"\", \"serviced-log-export-\")\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not create temp directory: %s\", err)\n\t}\n\texporter.tempdir = filepath.Join(exporter.tempdir, fmt.Sprintf(\"serviced-log-export-%s\", exporter.timeLabel))\n\terr = os.Mkdir(exporter.tempdir, 0700)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not create temp directory: %s\", err)\n\t}\n\n\t// create a file to hold parse warnings\n\texporter.parseWarningsFilename = filepath.Join(exporter.tempdir, \"warnings.log\")\n\texporter.parseWarningsFile, err = os.Create(exporter.parseWarningsFilename)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to create file %s: %s\", exporter.parseWarningsFilename, err)\n\t}\n\n\texporter.hostMap, err = getHostMap()\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"failed to get list of host: %s\", err)\n\t}\n\n\t// get services and build up servicemap\n\texporter.serviceMap, err = buildServiceMap(getServices)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"could not build service map: %s\", err)\n\t}\n\n\treturn exporter, nil\n}", "title": "" }, { "docid": "86b220230c66ca63dfd8d568f9ba04c7", "score": "0.46296653", "text": "func (o GetEngineVersionResultOutput) ExportableLogTypes() pulumi.StringArrayOutput {\n\treturn o.ApplyT(func(v GetEngineVersionResult) []string { return v.ExportableLogTypes }).(pulumi.StringArrayOutput)\n}", "title": "" }, { "docid": "255780804c98d04834ed8310cf1b5140", "score": "0.4629155", "text": "func (sc *ServiceConfig) logSetup() {\n\tzerolog.SetGlobalLevel(zerolog.InfoLevel)\n\tif sc.Debug {\n\t\tzerolog.SetGlobalLevel(zerolog.DebugLevel)\n\t}\n}", "title": "" }, { "docid": "90966a072737adc241505e9e8332e9ea", "score": "0.46236432", "text": "func SetColoredLogs(colored bool) {\n\tcoloredLogs = colored\n}", "title": "" }, { "docid": "ff0df51f314be20cfb7132b67a9e24a9", "score": "0.4619349", "text": "func InfoLog() bool {\n\treturn infoMode\n}", "title": "" }, { "docid": "f353db6bf8d5f2a3c24a89a83555a049", "score": "0.46092576", "text": "func (o AgentOutput) EnableStackdriverLogging() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v *Agent) pulumi.BoolOutput { return v.EnableStackdriverLogging }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "c34953b3226d0d100fef0b8a6b017eee", "score": "0.459776", "text": "func (indices *Indices) HasAuditLogs() bool {\n\tfor _, index := range *indices {\n\t\tif strings.HasPrefix(index.Name, AuditIndexPrefix) && index.DocCount() > 0 {\n\t\t\treturn true\n\t\t}\n\t}\n\treturn false\n}", "title": "" }, { "docid": "8fe2516bda291c3858415e6d51f39970", "score": "0.45818704", "text": "func (c *EvoEpiConfig) LogTransmission() bool { return c.LogParams.LogTransmission }", "title": "" }, { "docid": "89107a28dc6c2460ad94d9b8e47f42ce", "score": "0.45818165", "text": "func (p *LogFormatterParams) IsOutputColor() bool {\n\treturn true\n}", "title": "" }, { "docid": "c5c6d3ea60e4744917382593475b6271", "score": "0.45677522", "text": "func DisableLogs() {\n\tSetLogger(util.DiscardLogger())\n}", "title": "" }, { "docid": "0083b67b891fcff55b0f73b03796972a", "score": "0.45658046", "text": "func (cfg *Config) setupLogging() error {\n\tswitch cfg.Logger {\n\tcase \"capnslog\": // removed in v3.5\n\t\treturn fmt.Errorf(\"--logger=capnslog is removed in v3.5\")\n\n\tcase \"zap\":\n\t\tif len(cfg.LogOutputs) == 0 {\n\t\t\tcfg.LogOutputs = []string{DefaultLogOutput}\n\t\t}\n\t\tif len(cfg.LogOutputs) > 1 {\n\t\t\tfor _, v := range cfg.LogOutputs {\n\t\t\t\tif v == DefaultLogOutput {\n\t\t\t\t\treturn fmt.Errorf(\"multi logoutput for %q is not supported yet\", DefaultLogOutput)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tif cfg.EnableLogRotation {\n\t\t\tif err := setupLogRotation(cfg.LogOutputs, cfg.LogRotationConfigJSON); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\toutputPaths, errOutputPaths := make([]string, 0), make([]string, 0)\n\t\tisJournal := false\n\t\tfor _, v := range cfg.LogOutputs {\n\t\t\tswitch v {\n\t\t\tcase DefaultLogOutput:\n\t\t\t\toutputPaths = append(outputPaths, StdErrLogOutput)\n\t\t\t\terrOutputPaths = append(errOutputPaths, StdErrLogOutput)\n\n\t\t\tcase JournalLogOutput:\n\t\t\t\tisJournal = true\n\n\t\t\tcase StdErrLogOutput:\n\t\t\t\toutputPaths = append(outputPaths, StdErrLogOutput)\n\t\t\t\terrOutputPaths = append(errOutputPaths, StdErrLogOutput)\n\n\t\t\tcase StdOutLogOutput:\n\t\t\t\toutputPaths = append(outputPaths, StdOutLogOutput)\n\t\t\t\terrOutputPaths = append(errOutputPaths, StdOutLogOutput)\n\n\t\t\tdefault:\n\t\t\t\tvar path string\n\t\t\t\tif cfg.EnableLogRotation {\n\t\t\t\t\t// append rotate scheme to logs managed by lumberjack log rotation\n\t\t\t\t\tif v[0:1] == \"/\" {\n\t\t\t\t\t\tpath = fmt.Sprintf(\"rotate:/%%2F%s\", v[1:])\n\t\t\t\t\t} else {\n\t\t\t\t\t\tpath = fmt.Sprintf(\"rotate:/%s\", v)\n\t\t\t\t\t}\n\t\t\t\t} else {\n\t\t\t\t\tpath = v\n\t\t\t\t}\n\t\t\t\toutputPaths = append(outputPaths, path)\n\t\t\t\terrOutputPaths = append(errOutputPaths, path)\n\t\t\t}\n\t\t}\n\n\t\tif !isJournal {\n\t\t\tcopied := logutil.DefaultZapLoggerConfig\n\t\t\tcopied.OutputPaths = outputPaths\n\t\t\tcopied.ErrorOutputPaths = errOutputPaths\n\t\t\tcopied = logutil.MergeOutputPaths(copied)\n\t\t\tcopied.Level = zap.NewAtomicLevelAt(logutil.ConvertToZapLevel(cfg.LogLevel))\n\t\t\tif cfg.ZapLoggerBuilder == nil {\n\t\t\t\tlg, err := copied.Build()\n\t\t\t\tif err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t\tcfg.ZapLoggerBuilder = NewZapLoggerBuilder(lg)\n\t\t\t}\n\t\t} else {\n\t\t\tif len(cfg.LogOutputs) > 1 {\n\t\t\t\tfor _, v := range cfg.LogOutputs {\n\t\t\t\t\tif v != DefaultLogOutput {\n\t\t\t\t\t\treturn fmt.Errorf(\"running with systemd/journal but other '--log-outputs' values (%q) are configured with 'default'; override 'default' value with something else\", cfg.LogOutputs)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\t// use stderr as fallback\n\t\t\tsyncer, lerr := getJournalWriteSyncer()\n\t\t\tif lerr != nil {\n\t\t\t\treturn lerr\n\t\t\t}\n\n\t\t\tlvl := zap.NewAtomicLevelAt(logutil.ConvertToZapLevel(cfg.LogLevel))\n\n\t\t\t// WARN: do not change field names in encoder config\n\t\t\t// journald logging writer assumes field names of \"level\" and \"caller\"\n\t\t\tcr := zapcore.NewCore(\n\t\t\t\tzapcore.NewJSONEncoder(logutil.DefaultZapLoggerConfig.EncoderConfig),\n\t\t\t\tsyncer,\n\t\t\t\tlvl,\n\t\t\t)\n\t\t\tif cfg.ZapLoggerBuilder == nil {\n\t\t\t\tcfg.ZapLoggerBuilder = NewZapLoggerBuilder(zap.New(cr, zap.AddCaller(), zap.ErrorOutput(syncer)))\n\t\t\t}\n\t\t}\n\n\t\terr := cfg.ZapLoggerBuilder(cfg)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tlogTLSHandshakeFailure := func(conn *tls.Conn, err error) {\n\t\t\tstate := conn.ConnectionState()\n\t\t\tremoteAddr := conn.RemoteAddr().String()\n\t\t\tserverName := state.ServerName\n\t\t\tif len(state.PeerCertificates) > 0 {\n\t\t\t\tcert := state.PeerCertificates[0]\n\t\t\t\tips := make([]string, len(cert.IPAddresses))\n\t\t\t\tfor i := range cert.IPAddresses {\n\t\t\t\t\tips[i] = cert.IPAddresses[i].String()\n\t\t\t\t}\n\t\t\t\tcfg.logger.Warn(\n\t\t\t\t\t\"rejected connection\",\n\t\t\t\t\tzap.String(\"remote-addr\", remoteAddr),\n\t\t\t\t\tzap.String(\"server-name\", serverName),\n\t\t\t\t\tzap.Strings(\"ip-addresses\", ips),\n\t\t\t\t\tzap.Strings(\"dns-names\", cert.DNSNames),\n\t\t\t\t\tzap.Error(err),\n\t\t\t\t)\n\t\t\t} else {\n\t\t\t\tcfg.logger.Warn(\n\t\t\t\t\t\"rejected connection\",\n\t\t\t\t\tzap.String(\"remote-addr\", remoteAddr),\n\t\t\t\t\tzap.String(\"server-name\", serverName),\n\t\t\t\t\tzap.Error(err),\n\t\t\t\t)\n\t\t\t}\n\t\t}\n\t\tcfg.ClientTLSInfo.HandshakeFailure = logTLSHandshakeFailure\n\t\tcfg.PeerTLSInfo.HandshakeFailure = logTLSHandshakeFailure\n\n\tdefault:\n\t\treturn fmt.Errorf(\"unknown logger option %q\", cfg.Logger)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "3686fa1f2d7b347c5df2c96624179fa9", "score": "0.45649737", "text": "func DisableLog() { log = uclog.Disabled }", "title": "" }, { "docid": "11ea50f0ac6bb1db38e9dc64c7f8ff10", "score": "0.45614973", "text": "func (l logger) logsFull() bool {\n\treturn (lineCount + (fileCount * l.MAX_LINES_PER_FILE)) >= l.MAX_FILES*l.MAX_LINES_PER_FILE\n}", "title": "" }, { "docid": "ec023a063605752d15fa2752ad2477c0", "score": "0.4560121", "text": "func (c *Config) DisableLogging() {\n\tlogrus.SetOutput(ioutil.Discard)\n}", "title": "" }, { "docid": "d75489f2ebc6435126e346e754ca27e1", "score": "0.45363167", "text": "func newLogsExporter(config configmodels.Exporter, level string, logger *zap.Logger) (component.LogsExporter, error) {\n\ts := &loggingExporter{\n\t\tdebug: strings.ToLower(level) == \"debug\",\n\t\tlogger: logger,\n\t}\n\n\treturn exporterhelper.NewLogsExporter(\n\t\tconfig,\n\t\tlogger,\n\t\ts.pushLogData,\n\t\t// Disable Timeout/RetryOnFailure and SendingQueue\n\t\texporterhelper.WithTimeout(exporterhelper.TimeoutSettings{Timeout: 0}),\n\t\texporterhelper.WithRetry(exporterhelper.RetrySettings{Enabled: false}),\n\t\texporterhelper.WithQueue(exporterhelper.QueueSettings{Enabled: false}),\n\t\texporterhelper.WithShutdown(loggerSync(logger)),\n\t)\n}", "title": "" }, { "docid": "8918aea45e5cf743ff44f8e9b556e95b", "score": "0.4525741", "text": "func DisableLog() {\n\tLogger = seelog.Disabled\n}", "title": "" }, { "docid": "e38a45ef84ba72d32e19dd4724d9c96d", "score": "0.4524517", "text": "func EnableStdoutLogging() {\n\tsetAzLogListener(func(e azlog.Event, s string) {\n\t\tlog.Printf(\"%s %s\", e, s)\n\t})\n}", "title": "" }, { "docid": "85a3d3f2afe416beaa79ee76e1dbbace", "score": "0.45096293", "text": "func UseStdout() bool {\n\treturn os.Getenv(\"NOMAD_TEST_STDOUT\") == \"1\"\n}", "title": "" }, { "docid": "85a3d3f2afe416beaa79ee76e1dbbace", "score": "0.45096293", "text": "func UseStdout() bool {\n\treturn os.Getenv(\"NOMAD_TEST_STDOUT\") == \"1\"\n}", "title": "" }, { "docid": "53bd1f16986f0afb8b70417760499976", "score": "0.45051473", "text": "func initLogging() {\n\tif AppFlags.traceLogging {\n\t\tlog.SetLevel(log.TraceLevel)\n\t} else if AppFlags.debugLogging {\n\t\tlog.SetLevel(log.DebugLevel)\n\t} else {\n\t\tswitch logLevel := strings.ToUpper(os.Getenv(\"LOG_LEVEL\")); logLevel {\n\t\tcase \"TRACE\":\n\t\t\tlog.SetLevel(log.TraceLevel)\n\t\tcase \"DEBUG\":\n\t\t\tlog.SetLevel(log.DebugLevel)\n\t\tcase \"WARN\":\n\t\t\tlog.SetLevel(log.WarnLevel)\n\t\tcase \"ERROR\":\n\t\t\tlog.SetLevel(log.ErrorLevel)\n\t\tdefault:\n\t\t\tlog.SetLevel(log.InfoLevel)\n\t\t}\n\t}\n\tlog.SetOutput(ioutil.Discard)\n\tlog.AddHook(&writer.Hook{\n\t\tWriter: os.Stderr,\n\t\tLogLevels: []log.Level{\n\t\t\tlog.PanicLevel,\n\t\t\tlog.FatalLevel,\n\t\t\tlog.ErrorLevel,\n\t\t\tlog.WarnLevel,\n\t\t},\n\t})\n\tlog.AddHook(&writer.Hook{\n\t\tWriter: os.Stdout,\n\t\tLogLevels: []log.Level{\n\t\t\tlog.InfoLevel,\n\t\t\tlog.DebugLevel,\n\t\t\tlog.TraceLevel,\n\t\t},\n\t})\n\n\tformatter := &log.TextFormatter{\n\t\tForceColors: true,\n\t}\n\n\tif AppFlags.timestampedLogging || os.Getenv(\"LOG_TIMESTAMPS\") != \"\" {\n\t\tformatter.FullTimestamp = true\n\t}\n\n\tlog.SetFormatter(formatter)\n\n}", "title": "" }, { "docid": "ada8229abdcd30409c8787eb9fc1e1b7", "score": "0.45039317", "text": "func SetLog() {\n\tif customLogging {\n\t\treturn\n\t}\n\tif !EnableLogging {\n\t\tLogger = log.New(ioutil.Discard, \"\", log.Ldate|log.Ltime)\n\t\treturn\n\t}\n\n\t// If no file name was set, logging goes to the screen\n\tif ApiLogFileName == \"\" {\n\t\tif LogOnScreen == \"stderr\" || LogOnScreen == \"err\" {\n\t\t\tlog.SetOutput(os.Stderr)\n\t\t\tLogger = log.New(os.Stderr, \"\", log.Ldate|log.Ltime)\n\t\t} else {\n\t\t\tLogger = log.New(os.Stdout, \"\", log.Ldate|log.Ltime)\n\t\t}\n\t} else {\n\t\tLogger = newLogger(ApiLogFileName)\n\t}\n\tif len(skipTags) > 0 {\n\t\tLogger.Printf(\"### WILL SKIP THE FOLLOWING TAGS: %+v\", skipTags)\n\t}\n\tif len(apiLogFunctions) > 0 {\n\t\tLogger.Printf(\"### WILL ONLY INCLUDE API LOGS FROM THE FOLLOWING FUNCTIONS: %+v\", apiLogFunctions)\n\t}\n}", "title": "" }, { "docid": "067be21b67fb4995b63451abe1fd7903", "score": "0.44922024", "text": "func ShouldStoreJaegerTraces() bool {\n\treturn StoreJaegerTraces.GetBooleanOrDefault(false) &&\n\t\tutils.EnvVar(\"TRACER_ENABLED\").GetBooleanOrDefault(true)\n}", "title": "" }, { "docid": "dbf810ab992280cdb579aced5d2c99fb", "score": "0.4488281", "text": "func turnOnLogging(logLevel int32, fileHandle io.Writer) {\n\ttraceHandle := ioutil.Discard\n\tinfoHandle := ioutil.Discard\n\twarnHandle := ioutil.Discard\n\terrorHandle := ioutil.Discard\n\n\tif logLevel&LevelTrace != 0 {\n\t\ttraceHandle = os.Stdout\n\t\tinfoHandle = os.Stdout\n\t\twarnHandle = os.Stdout\n\t\terrorHandle = os.Stderr\n\t}\n\n\tif logLevel&LevelInfo != 0 {\n\t\tinfoHandle = os.Stdout\n\t\twarnHandle = os.Stdout\n\t\terrorHandle = os.Stderr\n\t}\n\n\tif logLevel&LevelWarn != 0 {\n\t\twarnHandle = os.Stdout\n\t\terrorHandle = os.Stderr\n\t}\n\n\tif logLevel&LevelError != 0 {\n\t\terrorHandle = os.Stderr\n\t}\n\n\tif fileHandle != nil {\n\t\tif traceHandle == os.Stdout {\n\t\t\ttraceHandle = io.MultiWriter(fileHandle, traceHandle)\n\t\t}\n\n\t\tif infoHandle == os.Stdout {\n\t\t\tinfoHandle = io.MultiWriter(fileHandle, infoHandle)\n\t\t}\n\n\t\tif warnHandle == os.Stdout {\n\t\t\twarnHandle = io.MultiWriter(fileHandle, warnHandle)\n\t\t}\n\n\t\tif errorHandle == os.Stderr {\n\t\t\terrorHandle = io.MultiWriter(fileHandle, errorHandle)\n\t\t}\n\t}\n\n\tlogger.MyTrace = log.New(traceHandle, \"TRACE: \", log.Ldate|log.Ltime|log.Lshortfile)\n\tlogger.MyInfo = log.New(infoHandle, \"INFO: \", log.Ldate|log.Ltime|log.Lshortfile)\n\tlogger.MyWarning = log.New(warnHandle, \"WARNING: \", log.Ldate|log.Ltime|log.Lshortfile)\n\tlogger.MyError = log.New(errorHandle, \"ERROR: \", log.Ldate|log.Ltime|log.Lshortfile)\n\n\tatomic.StoreInt32(&logger.LogLevel, logLevel)\n}", "title": "" }, { "docid": "d2d0c35dc392e1a3473784a842cad868", "score": "0.44877422", "text": "func LogSetup(dev bool) {\n\tbaselog := zerolog.New(os.Stdout)\n\tif dev {\n\t\tbaselog = zerolog.New(zerolog.ConsoleWriter{Out: os.Stdout})\n\t}\n\tapplog := baselog.With().Timestamp().Logger()\n\tlog.Logger = applog\n}", "title": "" }, { "docid": "348bbcf4c5f1adc76c09285228d86751", "score": "0.44826183", "text": "func (o WindowsFunctionAppSlotOutput) BuiltinLoggingEnabled() pulumi.BoolPtrOutput {\n\treturn o.ApplyT(func(v *WindowsFunctionAppSlot) pulumi.BoolPtrOutput { return v.BuiltinLoggingEnabled }).(pulumi.BoolPtrOutput)\n}", "title": "" }, { "docid": "feadf123b123ff3868829337abc3c767", "score": "0.44816583", "text": "func (x *TelemetryV2StackDriverConfig) GetLogging() *wrapperspb.BoolValue {\n\tif x != nil {\n\t\treturn x.Logging\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "cc108b5c3572983f5091c548546708f5", "score": "0.4480025", "text": "func LogEnable() {\n\tlogger = log.New(logFile, \"\", log.Lmicroseconds)\n}", "title": "" }, { "docid": "9046b15fbb1c2fab82a0e1fa47cf3431", "score": "0.44600305", "text": "func (l Logger) Enabled() bool {\n\treturn l.level <= l.verbosity\n}", "title": "" }, { "docid": "2ec1defb77627280dbfda506d51ee8c4", "score": "0.44525668", "text": "func (m *TelemetryV2StackDriverConfig) GetLogging() *protobuf.BoolValue {\n\tif m != nil {\n\t\treturn m.Logging\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2ec1defb77627280dbfda506d51ee8c4", "score": "0.44525668", "text": "func (m *TelemetryV2StackDriverConfig) GetLogging() *protobuf.BoolValue {\n\tif m != nil {\n\t\treturn m.Logging\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2ec1defb77627280dbfda506d51ee8c4", "score": "0.44525668", "text": "func (m *TelemetryV2StackDriverConfig) GetLogging() *protobuf.BoolValue {\n\tif m != nil {\n\t\treturn m.Logging\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "1b1175ef91ba8de06216209ea5f90b74", "score": "0.44471303", "text": "func (l *alwaysEnabledLogSink) Enabled(level int) bool {\n\treturn true\n}", "title": "" }, { "docid": "fb7483c8f865c3f14976ed253b160f43", "score": "0.44276494", "text": "func (o ConnectorS3LogDeliveryOutput) Enabled() pulumi.BoolOutput {\n\treturn o.ApplyT(func(v ConnectorS3LogDelivery) bool { return v.Enabled }).(pulumi.BoolOutput)\n}", "title": "" }, { "docid": "7e8cdc46d3c7846ded4fde1dee33f7f1", "score": "0.44228977", "text": "func (c *EKSCluster) GetLogging() bool {\n\treturn c.modelCluster.Logging\n}", "title": "" }, { "docid": "a57388af50beed2f458885fc8c2725c2", "score": "0.43749842", "text": "func (l *StdLogger) InfoEnabled() bool {\n\treturn l.logEnable.Enabled(zap.InfoLevel)\n}", "title": "" }, { "docid": "14287d8723c45f86ca470288f206275a", "score": "0.43719643", "text": "func TestingLogger() Logger {\n if _testingLogger != nil {\n return _testingLogger\n }\n\n if testing.Verbose() {\n _testingLogger = New(os.Stdout)\n } else {\n _testingLogger = NewNopLogger()\n }\n\n return _testingLogger\n}", "title": "" }, { "docid": "ea165fa97206ff3ce2c3ddd7b4ce4498", "score": "0.43714133", "text": "func mslog(message string) {\n\tif configuration.HearbeatLog {\n\t\tlog.Print(message)\n\t}\n}", "title": "" }, { "docid": "798cb1766555a0b27e533592f91e92c3", "score": "0.43707538", "text": "func (e *Enforcer) EnableLog(s bool) {\n\te.invalidateCache(func() {\n\t\te.enableLog = s\n\t})\n}", "title": "" }, { "docid": "0c32a375dd5f30b185b03056297a1c21", "score": "0.43569455", "text": "func enableDebugLogs() {\n\tsetLogLevel(logging.DEBUG)\n}", "title": "" }, { "docid": "54e7ae9c0e51f0570979d3ccd85d917f", "score": "0.43389195", "text": "func (status *OplogStatus) Export(ch chan<- prometheus.Metric) {\n\toplogStatusSizeBytes.WithLabelValues(\"current\").Set(0)\n\toplogStatusSizeBytes.WithLabelValues(\"storage\").Set(0)\n\tif status.CollectionStats != nil {\n\t\toplogStatusCount.Set(status.CollectionStats.Count)\n\t\toplogStatusSizeBytes.WithLabelValues(\"current\").Set(status.CollectionStats.Size)\n\t\toplogStatusSizeBytes.WithLabelValues(\"storage\").Set(status.CollectionStats.StorageSize)\n\t}\n\tif status.HeadTimestamp != 0 && status.TailTimestamp != 0 {\n\t\toplogStatusHeadTimestamp.Set(status.HeadTimestamp)\n\t\toplogStatusTailTimestamp.Set(status.TailTimestamp)\n\t}\n\n\toplogStatusCount.Collect(ch)\n\toplogStatusHeadTimestamp.Collect(ch)\n\toplogStatusTailTimestamp.Collect(ch)\n\toplogStatusSizeBytes.Collect(ch)\n}", "title": "" }, { "docid": "c4bc7c7af80585055e4851999278da44", "score": "0.4336388", "text": "func (lfe *logFieldEncoder) EmitBool(key string, value bool) {}", "title": "" }, { "docid": "6140cf9e53092f705a34fbfa83642793", "score": "0.43339866", "text": "func Happens(fmt string, args ...interface{}) {\n\tif isPackageEnabled() {\n\t\tlog.Printf(funcname(2)+\": \"+fmt+\"\\n\", args...)\n\t}\n}", "title": "" }, { "docid": "7bb785dd8342777eac3e0867464cd73e", "score": "0.43255195", "text": "func (l *StdLogger) WarnEnabled() bool {\n\treturn l.logEnable.Enabled(zap.WarnLevel)\n}", "title": "" }, { "docid": "f89c7fcaf61970b599db81a82ee81f11", "score": "0.4325491", "text": "func (o *ModelsTask) HasLog() bool {\n\tif o != nil && o.Log != nil {\n\t\treturn true\n\t}\n\n\treturn false\n}", "title": "" }, { "docid": "a2bd8aac13318602738c2ad6615a14e9", "score": "0.43230787", "text": "func EnableLogger() {\n\tInitLogger(os.Stderr)\n}", "title": "" }, { "docid": "269aedba64e2bd8d2fc8d5baebb2c96c", "score": "0.4317305", "text": "func (c *LoggingConfig) ShouldLog(action string) bool {\n\tif !c.Enabled {\n\t\treturn false\n\t} else if c.Actions == nil {\n\t\treturn true\n\t}\n\tvalue, exists := c.Actions[action]\n\treturn !exists || value\n}", "title": "" }, { "docid": "a730245f600db96e7821d7e02386f62e", "score": "0.43039918", "text": "func (this *Store) GetLoggingStat() bool {\n\treturn this.loggingStats\n}", "title": "" }, { "docid": "7895dfea6b9c38e4f7125127a2c22ae6", "score": "0.42944717", "text": "func (ssp *StackifySpanProcessor) isTraceExportable(trace_id trace.ID) bool {\n\treturn ssp.traces_started_count[trace_id]-ssp.traces_ended_count[trace_id] <= 0\n}", "title": "" }, { "docid": "6dbead3d17dc3ed50e59d491d2368852", "score": "0.42927924", "text": "func (s *Session) HideLogs() {\n\ts.logsHidden = true\n}", "title": "" }, { "docid": "88b5b2d7a2de5f4b93581a92d8a33065", "score": "0.42915002", "text": "func (s *Session) ShowLogs() {\n\ts.logsHidden = false\n}", "title": "" }, { "docid": "520f0f0f90172ecc37c301f72d009c8c", "score": "0.42896864", "text": "func DisableLog() {\n\tjww.DiscardLogging()\n}", "title": "" }, { "docid": "f227e5cdb92bc23bd2cf105e08348a25", "score": "0.42804486", "text": "func (ctx *LoggerContext) IfShouldWriteExchangeLog(fn func()) {\n\n\t// value in context have highest priority\n\tvar shouldWrite bool\n\tctxValue := ctx.Get(CtxShouldLogExchange)\n\tif ctxValue != nil {\n\t\tif shouldWrite, ok := ctxValue.(bool); ok && !shouldWrite {\n\t\t\treturn\n\t\t}\n\t}\n\n\tif shouldWrite || ctx.LogLevel == labstacklog.DEBUG {\n\t\tfn()\n\t}\n}", "title": "" }, { "docid": "b0168e6ec44deeeee35955672d3796db", "score": "0.42741475", "text": "func AnyExportLocation(int) (bool, error) { return true, nil }", "title": "" }, { "docid": "9854ccbe4a135b9efea9ae10209e4364", "score": "0.4273161", "text": "func (r *ComputeSubnetworkResource) IsFlowLogsEnabled() bool {\n\treturn r.s.EnableFlowLogs\n}", "title": "" }, { "docid": "bf52d3760fb49642c584864f3c224434", "score": "0.42697212", "text": "func setupLogOutput() {\n\tf, _ := os.Create(\"gin.log\")\n\tgin.DefaultWriter = io.MultiWriter(f, os.Stdout)\n}", "title": "" }, { "docid": "aac41bf38ab116dd1da814ce9d34d7a9", "score": "0.42576227", "text": "func logStuff(mylog string) {\n\tif true {\n\t\tlog.Println(mylog)\n\t}\n}", "title": "" }, { "docid": "994d88108daa89a8323fae6446e32c31", "score": "0.42525283", "text": "func HasLogger() bool {\r\n\tmu.Lock()\r\n\tdefer mu.Unlock()\r\n\treturn logger != nil\r\n}", "title": "" }, { "docid": "b7f53ea763a247650898800f3e9a2e92", "score": "0.42446887", "text": "func (l *Logger) TraceEnabled() bool {\n\treturn l.Level() <= Trace\n}", "title": "" }, { "docid": "574ac3b2891320a2dad508032edaaa8b", "score": "0.42350385", "text": "func validLoggingCacheOptions(t *testing.T) options.Output {\n\tlogger, err := jasper.NewInMemoryLogger(100)\n\tassert.NotError(t, err)\n\treturn options.Output{\n\t\tLoggers: []*options.LoggerConfig{logger},\n\t}\n}", "title": "" }, { "docid": "d97bb2605ab5cae02c390b114f663d68", "score": "0.42302373", "text": "func (o *Option) Exportable(v bool) *Option {\n\to.Options.Exportable = v\n\treturn o\n}", "title": "" }, { "docid": "a21c309d8b83180e4aa3407b86d20210", "score": "0.42277405", "text": "func DisableLog() {\n\tlogger = seelog.Disabled\n\tparse.DisableLog()\n}", "title": "" }, { "docid": "e7cd22cdc8bdcfc076ee53174b9e3ba3", "score": "0.422297", "text": "func (ts *tester) FetchLogs() (err error) {\n\tif !ts.cfg.EKSConfig.IsEnabledAddOnNodeGroups() {\n\t\tts.cfg.Logger.Info(\"skipping fetch logs for node groups\")\n\t\treturn nil\n\t}\n\tif !ts.cfg.EKSConfig.AddOnNodeGroups.FetchLogs {\n\t\tts.cfg.Logger.Info(\"skipping fetch logs for node groups\")\n\t\treturn nil\n\t}\n\n\tts.logsMu.Lock()\n\tdefer ts.logsMu.Unlock()\n\n\terr = os.MkdirAll(ts.cfg.EKSConfig.AddOnNodeGroups.LogsDir, 0700)\n\tif err != nil {\n\t\tts.cfg.Logger.Warn(\"failed to mkdir\", zap.Error(err))\n\t\treturn err\n\t}\n\n\terr = ts.fetchLogs(250, 10)\n\tif err != nil {\n\t\tts.cfg.Logger.Warn(\"failed to fetch logs\", zap.Error(err))\n\t\treturn err\n\t}\n\n\tts.cfg.Logger.Info(\"gzipping logs dir\", zap.String(\"logs-dir\", ts.cfg.EKSConfig.AddOnNodeGroups.LogsDir), zap.String(\"file-path\", ts.cfg.EKSConfig.AddOnNodeGroups.LogsTarGzPath))\n\terr = os.RemoveAll(ts.cfg.EKSConfig.AddOnNodeGroups.LogsTarGzPath)\n\tif err != nil {\n\t\tts.cfg.Logger.Warn(\"failed to remove temp file\", zap.Error(err))\n\t\treturn err\n\t}\n\terr = archiver.Archive([]string{ts.cfg.EKSConfig.AddOnNodeGroups.LogsDir}, ts.cfg.EKSConfig.AddOnNodeGroups.LogsTarGzPath)\n\tif err != nil {\n\t\tts.cfg.Logger.Warn(\"archive failed\", zap.Error(err))\n\t\treturn err\n\t}\n\tstat, err := os.Stat(ts.cfg.EKSConfig.AddOnNodeGroups.LogsTarGzPath)\n\tif err != nil {\n\t\tts.cfg.Logger.Warn(\"failed to os stat\", zap.Error(err))\n\t\treturn err\n\t}\n\tsz := humanize.Bytes(uint64(stat.Size()))\n\tts.cfg.Logger.Info(\"gzipped logs dir\", zap.String(\"logs-dir\", ts.cfg.EKSConfig.AddOnNodeGroups.LogsDir), zap.String(\"file-path\", ts.cfg.EKSConfig.AddOnNodeGroups.LogsTarGzPath), zap.String(\"file-size\", sz))\n\n\tts.cfg.EKSConfig.Sync()\n\treturn nil\n}", "title": "" }, { "docid": "bb367c962ad8990c9a774572364d3c3d", "score": "0.42187884", "text": "func (options *Options) configureOutput() {\n\tif options.Silent {\n\t\tgologger.MaxLevel = gologger.Silent\n\t}\n}", "title": "" }, { "docid": "9c14d0e2c5bbcac4a2d41781877ece32", "score": "0.42176673", "text": "func (h *ReportHandler) Logs(args *core.LogsArgs) {\n\tif args.Hidden {\n\t\treturn\n\t}\n\tif args.Step == nil {\n\t\treturn\n\t}\n\n\tw, err := h.getStepOutputWriter(args)\n\tif err != nil {\n\t\th.logger.WithField(\"Error\", err).Error(\"Unable to create step output writer\")\n\t\treturn\n\t}\n\tw.Write([]byte(args.Logs))\n}", "title": "" }, { "docid": "1961ac8a640bd3e44fd6ba6a22ab5acb", "score": "0.421253", "text": "func (d *deployer) DumpClusterLogs() error {\n\t// gkeLogDumpTemplate is a template of a shell script where\n\t// - %[1]s is the project\n\t// - %[2]s is the zone\n\t// - %[3]s is a filter composed of the instance groups\n\t// - %[4]s is the log-dump.sh command line\n\tconst gkeLogDumpTemplate = `\nfunction log_dump_custom_get_instances() {\n if [[ $1 == \"master\" ]]; then\n return 0\n fi\n\n gcloud compute instances list '--project=%[1]s' '--filter=%[4]s' '--format=get(name)'\n}\nexport -f log_dump_custom_get_instances\n# Set below vars that log-dump.sh expects in order to use scp with gcloud.\nexport PROJECT=%[1]s\nexport ZONE='%[2]s'\nexport KUBERNETES_PROVIDER=gke\nexport KUBE_NODE_OS_DISTRIBUTION='%[3]s'\n%[5]s\n`\n\tfor _, project := range d.projects {\n\t\t// Prevent an obvious injection.\n\t\tif strings.Contains(d.localLogsDir, \"'\") || strings.Contains(d.gcsLogsDir, \"'\") {\n\t\t\treturn fmt.Errorf(\"%q or %q contain single quotes - nice try\", d.localLogsDir, d.gcsLogsDir)\n\t\t}\n\n\t\t// Generate a slice of filters to be OR'd together below\n\t\tvar filters []string\n\t\tfor _, cluster := range d.projectClustersLayout[project] {\n\t\t\tif err := d.getInstanceGroups(); err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfor _, ig := range d.instanceGroups[project][cluster] {\n\t\t\t\tfilters = append(filters, fmt.Sprintf(\"(metadata.created-by:*%s)\", ig.path))\n\t\t\t}\n\t\t}\n\n\t\t// Generate the log-dump.sh command-line\n\t\tdumpCmd := fmt.Sprintf(\"./cluster/log-dump/log-dump.sh '%s'\", d.localLogsDir)\n\t\tif d.gcsLogsDir != \"\" {\n\t\t\tdumpCmd += \" \" + d.gcsLogsDir\n\t\t}\n\n\t\tif err := runWithOutput(exec.Command(\"bash\", \"-c\", fmt.Sprintf(gkeLogDumpTemplate,\n\t\t\tproject,\n\t\t\td.zone,\n\t\t\tos.Getenv(\"NODE_OS_DISTRIBUTION\"),\n\t\t\tstrings.Join(filters, \" OR \"),\n\t\t\tdumpCmd))); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "8fed001d5886bab0d94312c610d939c8", "score": "0.42091626", "text": "func (z *ZzzMutator) Logs() []A.X { //nolint:dupl false positive\n\treturn z.logs\n}", "title": "" }, { "docid": "40ce0696fb1d54454aabba9e970d20be", "score": "0.4201144", "text": "func MaybeSetupLoggerIfOnJournaldAvailable() {\n\tjournalhook.Enable()\n}", "title": "" }, { "docid": "f32792f180d481cdcad9512f62eb7c78", "score": "0.4186031", "text": "func (ctx *Context) SkippingLogging() bool {\n\tctx.mu.RLock()\n\tdefer ctx.mu.RUnlock()\n\n\treturn ctx.skipLogging\n}", "title": "" }, { "docid": "a1c4c7711999096a9c6adb7d2b4fa189", "score": "0.41853315", "text": "func LLDBServerOutput() bool {\n\treturn lldbServerOutput\n}", "title": "" }, { "docid": "a6a370f0ce1c58508d06dd65a2d200ec", "score": "0.4182773", "text": "func (c *EKSCluster) SetLogging(l bool) {\n\tc.modelCluster.Logging = l\n}", "title": "" } ]
835dc51c89a40715153d95e3aa8b064e
Test Uint64 % Float64
[ { "docid": "e922cc5826fab266d6ba3a852d1c5e3e", "score": "0.71974504", "text": "func TestCheckBinaryTypedExprUint64RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 18446744073709551615 % 4.29497e+09 (mismatched types uint64 and float64)`,\n\t)\n\n}", "title": "" } ]
[ { "docid": "1817f13e07a94b55fbebbd9147629447", "score": "0.74663436", "text": "func TestCheckBinaryTypedExprUint64RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `uint64(0xffffffffffffffff) % 2.0`, env, uint64(0xffffffffffffffff) % 2.0, reflect.TypeOf(uint64(0xffffffffffffffff) % 2.0))\n}", "title": "" }, { "docid": "c4cbb2177ec7f765c4f91c9a0cdd4bd0", "score": "0.7295803", "text": "func TestCheckBinaryTypedExprFloat64RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 4.29497e+09 (operator % not defined on float64)`,\n\t)\n\n}", "title": "" }, { "docid": "b9d42ab447133888d62fb7d82566ca7b", "score": "0.7274148", "text": "func TestCheckBinaryTypedExprFloat64RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % 2.0`, env,\n\t\t`invalid operation: 4.29497e+09 % 2 (operator % not defined on float64)`,\n\t)\n\n}", "title": "" }, { "docid": "da9cbe225dab318a5859bd0d848f644a", "score": "0.7171874", "text": "func Float64() float64", "title": "" }, { "docid": "a6741b95d077ba84562511a194d92b19", "score": "0.7140947", "text": "func TestCheckBinaryTypedExprFloat64RemUint64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % uint64(0xffffffffffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 18446744073709551615 (mismatched types float64 and uint64)`,\n\t)\n\n}", "title": "" }, { "docid": "f0752996bd44eed3d02d8dde1a3775da", "score": "0.711267", "text": "func TestCheckBinaryTypedExprFloat32RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 4.29497e+09 (mismatched types float32 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "092f769579460b97a1197f67f95518ed", "score": "0.71124196", "text": "func TestCheckBinaryTypedExprUint64RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) % float32(0xffffffff)`, env,\n\t\t`invalid operation: 18446744073709551615 % 4.29497e+09 (mismatched types uint64 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "792d53483bf6ee257597a79a875c7526", "score": "0.7104185", "text": "func TestCheckBinaryTypedExprUint32RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint32(0xffffffff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 4294967295 % 4.29497e+09 (mismatched types uint32 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "102d32db8da956f6dbc6a0c4dba33e6f", "score": "0.70845616", "text": "func TestCheckBinaryTypedExprInt64RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `int64(0x7fffffffffffffff) % 2.0`, env, int64(0x7fffffffffffffff) % 2.0, reflect.TypeOf(int64(0x7fffffffffffffff) % 2.0))\n}", "title": "" }, { "docid": "fc6339c80532e262ebce22e801de1041", "score": "0.70683634", "text": "func TestCheckBinaryTypedExprFloat32RemUint64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % uint64(0xffffffffffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 18446744073709551615 (mismatched types float32 and uint64)`,\n\t)\n\n}", "title": "" }, { "docid": "91803a3c48c60dd9b3ebbc95b5458acb", "score": "0.7064613", "text": "func TestCheckBinaryTypedExprUint32RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `uint32(0xffffffff) % 2.0`, env, uint32(0xffffffff) % 2.0, reflect.TypeOf(uint32(0xffffffff) % 2.0))\n}", "title": "" }, { "docid": "69afdc69514f32082d73de5eef0024bd", "score": "0.70385075", "text": "func TestCheckBinaryTypedExprFloat64RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % float32(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 4.29497e+09 (mismatched types float64 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "83c58364fb4d858a3dc2704318673c0a", "score": "0.69159263", "text": "func TestCheckBinaryTypedExprUint16RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint16(0xffff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 65535 % 4.29497e+09 (mismatched types uint16 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "d7b7691547d2c0bcbbaa4ad7c119c68d", "score": "0.69154334", "text": "func TestCheckBinaryTypedExprFloat64RemUint32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % uint32(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 4294967295 (mismatched types float64 and uint32)`,\n\t)\n\n}", "title": "" }, { "docid": "8d5153e9fe3829590a1b5e5cc1bfe06c", "score": "0.69132113", "text": "func TestCheckBinaryTypedExprUint16RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `uint16(0xffff) % 2.0`, env, uint16(0xffff) % 2.0, reflect.TypeOf(uint16(0xffff) % 2.0))\n}", "title": "" }, { "docid": "b48f52845e9a703b1ec37e55f2d86f89", "score": "0.68831575", "text": "func TestCheckBinaryTypedExprFloat64RemInt64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % int64(0x7fffffffffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 9223372036854775807 (mismatched types float64 and int64)`,\n\t)\n\n}", "title": "" }, { "docid": "ec5eb42ad675f8b97416894b6dbdf186", "score": "0.68795824", "text": "func TestCheckBinaryTypedExprFloat64RemUint16(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % uint16(0xffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 65535 (mismatched types float64 and uint16)`,\n\t)\n\n}", "title": "" }, { "docid": "853bfcd95a41942af8c7663f27a57c5f", "score": "0.68609476", "text": "func TestCheckBinaryTypedExprInt64RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `int64(0x7fffffffffffffff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 9223372036854775807 % 4.29497e+09 (mismatched types int64 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "542c8eed83fcb391dfd8bfd5c85a0898", "score": "0.68078065", "text": "func TestCheckBinaryTypedExprFloat64RemInt(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % 4`, env,\n\t\t`invalid operation: 4.29497e+09 % 4 (operator % not defined on float64)`,\n\t)\n\n}", "title": "" }, { "docid": "799f736796da9932bca60c9100105fb0", "score": "0.6797607", "text": "func TestCheckBinaryTypedExprUint64EqlFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `uint64(0xffffffffffffffff) == 2.0`, env, uint64(0xffffffffffffffff) == 2.0, reflect.TypeOf(uint64(0xffffffffffffffff) == 2.0))\n}", "title": "" }, { "docid": "87f470cf6f5352446c6eff81338e87a9", "score": "0.67926216", "text": "func TestCheckBinaryTypedExprFloat64EqlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `float64(0xffffffff) == float64(0xffffffff)`, env, float64(0xffffffff) == float64(0xffffffff), reflect.TypeOf(float64(0xffffffff) == float64(0xffffffff)))\n}", "title": "" }, { "docid": "81ef2f10fe2166a7b7ddc14e7e6fccfb", "score": "0.6750869", "text": "func TestCheckBinaryTypedExprFloat32RemInt64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % int64(0x7fffffffffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 9223372036854775807 (mismatched types float32 and int64)`,\n\t)\n\n}", "title": "" }, { "docid": "42676c0fefd8f559c76aa761d03ac2c3", "score": "0.6746705", "text": "func TestCheckBinaryTypedExprFloat32RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % 2.0`, env,\n\t\t`invalid operation: 4.29497e+09 % 2 (operator % not defined on float32)`,\n\t)\n\n}", "title": "" }, { "docid": "a670fe49eff25cba4c3cd7b0bd5f84fb", "score": "0.6719055", "text": "func TestCheckBinaryTypedExprUint8RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint8(0xff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 255 % 4.29497e+09 (mismatched types uint8 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "ea199fc5f48dca22625ec8783be99eb7", "score": "0.66963524", "text": "func TestCheckBinaryTypedExprFloat64RemUint8(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % uint8(0xff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 255 (mismatched types float64 and uint8)`,\n\t)\n\n}", "title": "" }, { "docid": "de7faf5d0ac381627951da983dda8531", "score": "0.66806245", "text": "func TestCheckBinaryTypedExprFloat64EqlFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `float64(0xffffffff) == 2.0`, env, float64(0xffffffff) == 2.0, reflect.TypeOf(float64(0xffffffff) == 2.0))\n}", "title": "" }, { "docid": "dfaeb64109c0c0ab039d2dbdc5cf45ff", "score": "0.6676763", "text": "func TestCheckBinaryTypedExprInt64RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `int64(0x7fffffffffffffff) % float32(0xffffffff)`, env,\n\t\t`invalid operation: 9223372036854775807 % 4.29497e+09 (mismatched types int64 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "2b0b29402f14e074397f11d62276997e", "score": "0.6609957", "text": "func TestCheckBinaryTypedExprFloat32RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % float32(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 4.29497e+09 (operator % not defined on float32)`,\n\t)\n\n}", "title": "" }, { "docid": "da2531fc8495e80dd28bb311d10f71a5", "score": "0.66059655", "text": "func TestCheckBinaryTypedExprUint8RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `uint8(0xff) % 2.0`, env, uint8(0xff) % 2.0, reflect.TypeOf(uint8(0xff) % 2.0))\n}", "title": "" }, { "docid": "7cd690b462837a7980c74f445d6bc069", "score": "0.66057587", "text": "func TestCheckBinaryTypedExprInt32RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `int32(0x7fffffff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 2147483647 % 4.29497e+09 (mismatched types int32 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "f5831b8999be4dc1d9286742638392e9", "score": "0.6594654", "text": "func TestCheckBinaryTypedExprUint32RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint32(0xffffffff) % float32(0xffffffff)`, env,\n\t\t`invalid operation: 4294967295 % 4.29497e+09 (mismatched types uint32 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "4aa077668da06eb56f804cf3fafd68ea", "score": "0.659245", "text": "func TestCheckBinaryTypedExprFloat32RemUint16(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % uint16(0xffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 65535 (mismatched types float32 and uint16)`,\n\t)\n\n}", "title": "" }, { "docid": "f178eed5b9f16b3c8869b3246b29c0af", "score": "0.65874183", "text": "func TestCheckBinaryTypedExprUint16RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint16(0xffff) % float32(0xffffffff)`, env,\n\t\t`invalid operation: 65535 % 4.29497e+09 (mismatched types uint16 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "719e1eaf0463c0e65016bad7d25bff57", "score": "0.655997", "text": "func TestCheckBinaryTypedExprInt32RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `int32(0x7fffffff) % 2.0`, env, int32(0x7fffffff) % 2.0, reflect.TypeOf(int32(0x7fffffff) % 2.0))\n}", "title": "" }, { "docid": "df222da1f3547d61f9219507f238ba3c", "score": "0.65587133", "text": "func TestCheckBinaryTypedExprUint64GtrFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `uint64(0xffffffffffffffff) > 2.0`, env, uint64(0xffffffffffffffff) > 2.0, reflect.TypeOf(uint64(0xffffffffffffffff) > 2.0))\n}", "title": "" }, { "docid": "00a9e85990f070f5ea075e9554f0a463", "score": "0.6556613", "text": "func TestCheckBinaryTypedExprInt16RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `int16(0x7fff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 32767 % 4.29497e+09 (mismatched types int16 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "d88b53db6d850507b60261181368fa44", "score": "0.65522814", "text": "func TestCheckBinaryTypedExprFloat64RemInt16(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % int16(0x7fff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 32767 (mismatched types float64 and int16)`,\n\t)\n\n}", "title": "" }, { "docid": "c4295f0b47fd4e957d0d4b93e1065514", "score": "0.6536067", "text": "func TestCheckBinaryTypedExprUint64EqlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) == float64(0xffffffff)`, env,\n\t\t`invalid operation: 18446744073709551615 == 4.29497e+09 (mismatched types uint64 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "e57a6a4c8ad81ac4a08f156658e67f04", "score": "0.6521084", "text": "func TestCheckBinaryTypedExprFloat64AddFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `float64(0xffffffff) + float64(0xffffffff)`, env, float64(0xffffffff) + float64(0xffffffff), reflect.TypeOf(float64(0xffffffff) + float64(0xffffffff)))\n}", "title": "" }, { "docid": "ad813acca3ea71848ad284a2bf7f2f11", "score": "0.6518041", "text": "func TestCheckBinaryTypedExprStringTRemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `string(\"abc\") % float64(0xffffffff)`, env,\n\t\t`invalid operation: \"abc\" % 4.29497e+09 (mismatched types string and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "e5a1366db3b2376d3dfa6ce287f2bed0", "score": "0.65015256", "text": "func TestCheckBinaryTypedExprRune32RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `rune(0x7fffffff) % 2.0`, env, rune(0x7fffffff) % 2.0, reflect.TypeOf(rune(0x7fffffff) % 2.0))\n}", "title": "" }, { "docid": "3c882db0aedfbeffccc301f635e27516", "score": "0.64991677", "text": "func TestCheckBinaryTypedExprFloat32RemUint32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % uint32(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 4294967295 (mismatched types float32 and uint32)`,\n\t)\n\n}", "title": "" }, { "docid": "8dd24e473b433e75a1e84b3f332dc998", "score": "0.6494864", "text": "func Float64() float64 {\nagain:\n\tstate1 := global.next()\n\tstate2 := global.next()\n\n\txor1 := uint32(((state1 >> 18) ^ state1) >> 27)\n\tshift1 := uint(state1>>59) & 31\n\n\txor2 := uint32(((state2 >> 18) ^ state2) >> 27)\n\tshift2 := uint(state2>>59) & 31\n\n\tv := uint64(xor1>>shift1|xor1<<(32-shift1)) |\n\t\tuint64(xor2>>shift2|xor2<<(32-shift2))\n\n\tout := float64(v>>(64-53)) / (1 << 53)\n\tif out == 1 {\n\t\tgoto again\n\t}\n\n\treturn out\n}", "title": "" }, { "docid": "ca7c3f4e038350f06434ea9d0c6ec2fa", "score": "0.64926374", "text": "func Float64Equals (t *testing.T, name string , got float64, expected float64 ) {\n if got != expected {\n t.Errorf(\"Failed %s\\ngot\\n%v\\n\\nexpected\\n%v\\n\\n\", name, got, expected )\n\t\tt.FailNow()\n }\n}", "title": "" }, { "docid": "7ec65aebb16d1e87f5d5cda83ff841c4", "score": "0.6480377", "text": "func TestCheckBinaryTypedExprUint64ShlFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) << 2.0`, env,\n\t\t`constant 73786976294838206460 overflows uint64`,\n\t)\n\n}", "title": "" }, { "docid": "53c1f1e00eefc82cfa1c5b4b058499da", "score": "0.6480188", "text": "func TestCheckBinaryTypedExprFloat64GtrFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `float64(0xffffffff) > float64(0xffffffff)`, env, float64(0xffffffff) > float64(0xffffffff), reflect.TypeOf(float64(0xffffffff) > float64(0xffffffff)))\n}", "title": "" }, { "docid": "d2bed24f61e33c3e2865d7b50c41beb0", "score": "0.6470623", "text": "func TestCheckBinaryTypedExprFloat64ShlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) << float64(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 << 4.29497e+09 (shift count type float64, must be unsigned integer)`,\n\t)\n\n}", "title": "" }, { "docid": "900bd34ef16d9013a45c2c172d8880af", "score": "0.6458014", "text": "func TestCheckBinaryTypedExprRune32RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `rune(0x7fffffff) % float64(0xffffffff)`, env,\n\t\t`invalid operation: rune(2147483647) % 4.29497e+09 (mismatched types rune and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "8560e561c01e0e5872524b9d933ff483", "score": "0.64521915", "text": "func TestCheckBinaryTypedExprFloat64RemInt8(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % int8(0x7f)`, env,\n\t\t`invalid operation: 4.29497e+09 % 127 (mismatched types float64 and int8)`,\n\t)\n\n}", "title": "" }, { "docid": "96a56edb4b7367d959859946089f7e41", "score": "0.6451021", "text": "func TestCheckBinaryTypedExprInt16RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `int16(0x7fff) % 2.0`, env, int16(0x7fff) % 2.0, reflect.TypeOf(int16(0x7fff) % 2.0))\n}", "title": "" }, { "docid": "8b6d7c5957425ac76f2e4b2de643ce9f", "score": "0.64491475", "text": "func TestCheckBinaryTypedExprFloat64RemInt32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % int32(0x7fffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 2147483647 (mismatched types float64 and int32)`,\n\t)\n\n}", "title": "" }, { "docid": "00eff06f376a61e7ed22ff7a12ed07d2", "score": "0.6447959", "text": "func TestCheckBinaryTypedExprUint64AndFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `uint64(0xffffffffffffffff) & 2.0`, env, uint64(0xffffffffffffffff) & 2.0, reflect.TypeOf(uint64(0xffffffffffffffff) & 2.0))\n}", "title": "" }, { "docid": "b55e5d589289a9857fe233cfbd5f6594", "score": "0.64470637", "text": "func TestCheckBinaryTypedExprFloat64EqlUint64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) == uint64(0xffffffffffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 == 18446744073709551615 (mismatched types float64 and uint64)`,\n\t)\n\n}", "title": "" }, { "docid": "4adca65e8ec93e9e89fd81e814f85b7b", "score": "0.6435781", "text": "func TestCheckBinaryTypedExprFloat64RemString(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % \"abc\"`, env,\n\t\t`cannot convert \"abc\" to type float64`,\n\t\t`invalid operation: 4.29497e+09 % \"abc\" (mismatched types float64 and string)`,\n\t)\n\n}", "title": "" }, { "docid": "d38eb70639c2f568533406fc8c451767", "score": "0.64299667", "text": "func TestCheckBinaryTypedExprComplex64RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `complex64(0xffffffff + 0xffffffff * 1i) % 2.0`, env,\n\t\t`invalid operation: (4.29497e+09+4.29497e+09i) % 2 (operator % not defined on complex64)`,\n\t)\n\n}", "title": "" }, { "docid": "31eaee9e1123022fb1669f8c5b6411c7", "score": "0.6422131", "text": "func TestCheckBinaryTypedExprFloat64AddFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `float64(0xffffffff) + 2.0`, env, float64(0xffffffff) + 2.0, reflect.TypeOf(float64(0xffffffff) + 2.0))\n}", "title": "" }, { "docid": "b41d84401d5c99cc41bc9017e8006613", "score": "0.6416466", "text": "func TestCheckBinaryTypedExprInt8RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `int8(0x7f) % float64(0xffffffff)`, env,\n\t\t`invalid operation: 127 % 4.29497e+09 (mismatched types int8 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "3ba9e3c1dae0154d01675c6c94df0c88", "score": "0.6415994", "text": "func TestCheckBinaryTypedExprComplex64RemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `complex64(0xffffffff + 0xffffffff * 1i) % float64(0xffffffff)`, env,\n\t\t`invalid operation: (4.29497e+09+4.29497e+09i) % 4.29497e+09 (mismatched types complex64 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "3881d05bd6a24f498df7663fc1f731dd", "score": "0.64135396", "text": "func TestCheckBinaryTypedExprFloat32RemUint8(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % uint8(0xff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 255 (mismatched types float32 and uint8)`,\n\t)\n\n}", "title": "" }, { "docid": "a9f0db774cc8275126aaea8430b8103a", "score": "0.6402761", "text": "func TestCheckBinaryTypedExprUint64EqlFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) == float32(0xffffffff)`, env,\n\t\t`invalid operation: 18446744073709551615 == 4.29497e+09 (mismatched types uint64 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "d23bb75ed4a5da76e4bd3bdfda37f1fc", "score": "0.6397437", "text": "func Float64(v float64) Value { return Value{typ: numberType, f: v} }", "title": "" }, { "docid": "d7b780118b3795b357559d6b915c8d17", "score": "0.63927615", "text": "func TestCheckBinaryTypedExprFloat64GtrFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `float64(0xffffffff) > 2.0`, env, float64(0xffffffff) > 2.0, reflect.TypeOf(float64(0xffffffff) > 2.0))\n}", "title": "" }, { "docid": "091f2a0cae89c2c89ed5679293fbcd56", "score": "0.63830936", "text": "func TestCheckBinaryTypedExprBoolTRemFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `bool(true) % float64(0xffffffff)`, env,\n\t\t`invalid operation: true % 4.29497e+09 (mismatched types bool and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "1e91fd42eb5506aedc12e4842ddc169e", "score": "0.63777125", "text": "func TestCheckBinaryTypedExprFloat32EqlUint64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) == uint64(0xffffffffffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 == 18446744073709551615 (mismatched types float32 and uint64)`,\n\t)\n\n}", "title": "" }, { "docid": "5317bb0123fdebb2df75369509bd355b", "score": "0.6373019", "text": "func TestCheckBinaryTypedExprUint64ShlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) << float64(0xffffffff)`, env,\n\t\t`invalid operation: 18446744073709551615 << 4.29497e+09 (shift count type float64, must be unsigned integer)`,\n\t)\n\n}", "title": "" }, { "docid": "428dd35184365e6db8329e56674058cc", "score": "0.6371413", "text": "func (r *Rand) Float64() float64", "title": "" }, { "docid": "37667728b38b60458b446d92430b5f83", "score": "0.635252", "text": "func TestCheckBinaryTypedExprFloat64RemBool(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % true`, env,\n\t\t`cannot convert true to type float64`,\n\t\t`invalid operation: 4.29497e+09 % true (mismatched types float64 and bool)`,\n\t)\n\n}", "title": "" }, { "docid": "87bc15687afafcb3833688e6b506e139", "score": "0.6350541", "text": "func TestCheckBinaryTypedExprUint32EqlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint32(0xffffffff) == float64(0xffffffff)`, env,\n\t\t`invalid operation: 4294967295 == 4.29497e+09 (mismatched types uint32 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "b4c811827f0b179928c23ba50f88c781", "score": "0.6327097", "text": "func TestCheckBinaryTypedExprUint64RemUint64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `uint64(0xffffffffffffffff) % uint64(0xffffffffffffffff)`, env, uint64(0xffffffffffffffff) % uint64(0xffffffffffffffff), reflect.TypeOf(uint64(0xffffffffffffffff) % uint64(0xffffffffffffffff)))\n}", "title": "" }, { "docid": "6aeb2a797e04d6778781cb31ee8ce529", "score": "0.6324903", "text": "func TestCheckBinaryTypedExprUint8RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint8(0xff) % float32(0xffffffff)`, env,\n\t\t`invalid operation: 255 % 4.29497e+09 (mismatched types uint8 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "e2dc2d8d806816f06dce1ffda36d3fa4", "score": "0.63163924", "text": "func TestCheckBinaryTypedExprFloat32ShlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) << float64(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 << 4.29497e+09 (shift count type float64, must be unsigned integer)`,\n\t)\n\n}", "title": "" }, { "docid": "78f26554d6aa085e7c6929dd01ae0f99", "score": "0.6298479", "text": "func TestCheckBinaryTypedExprUint32RemUint64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint32(0xffffffff) % uint64(0xffffffffffffffff)`, env,\n\t\t`invalid operation: 4294967295 % 18446744073709551615 (mismatched types uint32 and uint64)`,\n\t)\n\n}", "title": "" }, { "docid": "f5eae0c4ee041445a1be38e970d50320", "score": "0.62935185", "text": "func TestCheckBinaryTypedExprUint64AndFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) & float64(0xffffffff)`, env,\n\t\t`invalid operation: 18446744073709551615 & 4.29497e+09 (mismatched types uint64 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "96b2faf6277d670f5aa846c9c12bfa1c", "score": "0.629142", "text": "func TestCheckBinaryTypedExprFloat64RemRune(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % '@'`, env,\n\t\t`invalid operation: 4.29497e+09 % 64 (operator % not defined on float64)`,\n\t)\n\n}", "title": "" }, { "docid": "17cc36b15d552906723f1d23e72ffe81", "score": "0.6288151", "text": "func TestCheckBinaryTypedExprInt64EqlFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `int64(0x7fffffffffffffff) == 2.0`, env, int64(0x7fffffffffffffff) == 2.0, reflect.TypeOf(int64(0x7fffffffffffffff) == 2.0))\n}", "title": "" }, { "docid": "2c38a3f171d79602a39a10a2dd1932d8", "score": "0.6286086", "text": "func TestCheckBinaryTypedExprFloat64RemComplex64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % complex64(0xffffffff + 0xffffffff * 1i)`, env,\n\t\t`invalid operation: 4.29497e+09 % (4.29497e+09+4.29497e+09i) (mismatched types float64 and complex64)`,\n\t)\n\n}", "title": "" }, { "docid": "27d40c2ec2824006722edca38cfbedaa", "score": "0.6273903", "text": "func TestCheckBinaryTypedExprFloat32EqlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) == float64(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 == 4.29497e+09 (mismatched types float32 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "a0dbb83afe79c025411ad260b3e58787", "score": "0.6272683", "text": "func TestCheckBinaryTypedExprFloat64RemBoolT(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % bool(true)`, env,\n\t\t`invalid operation: 4.29497e+09 % true (mismatched types float64 and bool)`,\n\t)\n\n}", "title": "" }, { "docid": "f759d19f72e6ecb0105a8feb89f965ab", "score": "0.6247815", "text": "func TestCheckBinaryTypedExprFloat64ShlFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) << 2.0`, env,\n\t\t`invalid operation: 4.29497e+09 << 2 (shift of type float64)`,\n\t)\n\n}", "title": "" }, { "docid": "aaed149eca60228087b7f98af20142e4", "score": "0.62457126", "text": "func TestCheckBinaryTypedExprFloat64RemNil(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % nil`, env,\n\t\t`cannot convert nil to type float64`,\n\t)\n\n}", "title": "" }, { "docid": "46d512da83713bc2f2e07fe02e4ad4f6", "score": "0.624329", "text": "func TestCheckBinaryTypedExprFloat64ShlUint64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) << uint64(0xffffffffffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 << 18446744073709551615 (shift of type float64)`,\n\t)\n\n}", "title": "" }, { "docid": "25d331235f45e3487023ea3486550d79", "score": "0.6235658", "text": "func TestCheckBinaryTypedExprFloat64RemComplex(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % 8.0i`, env,\n\t\t`constant 0+8i truncated to real`,\n\t\t`invalid operation: 4.29497e+09 % 0 (operator % not defined on float64)`,\n\t)\n\n}", "title": "" }, { "docid": "16c04f28502d6e17b79868f6f21c8e32", "score": "0.62319547", "text": "func TestCheckBinaryTypedExprFloat64AndFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) & float64(0xffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 & 4.29497e+09 (operator & not defined on float64)`,\n\t)\n\n}", "title": "" }, { "docid": "c27b42f853fd9e6fc0c92d62f3d82c2a", "score": "0.6229142", "text": "func TestCheckBinaryTypedExprUint64GtrFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) > float64(0xffffffff)`, env,\n\t\t`invalid operation: 18446744073709551615 > 4.29497e+09 (mismatched types uint64 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "33bf1e93640f65bfb57f2ec9d1ab6269", "score": "0.622271", "text": "func TestCheckBinaryTypedExprUint32ShlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint32(0xffffffff) << float64(0xffffffff)`, env,\n\t\t`invalid operation: 4294967295 << 4.29497e+09 (shift count type float64, must be unsigned integer)`,\n\t)\n\n}", "title": "" }, { "docid": "97b653baa0befdfa0aace15072f7a7fd", "score": "0.62206966", "text": "func TestCheckBinaryTypedExprFloat32RemInt16(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % int16(0x7fff)`, env,\n\t\t`invalid operation: 4.29497e+09 % 32767 (mismatched types float32 and int16)`,\n\t)\n\n}", "title": "" }, { "docid": "d968900d0e1438e119b20d316f0a466a", "score": "0.6220312", "text": "func TestCheckBinaryTypedExprComplex64RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `complex64(0xffffffff + 0xffffffff * 1i) % float32(0xffffffff)`, env,\n\t\t`invalid operation: (4.29497e+09+4.29497e+09i) % 4.29497e+09 (mismatched types complex64 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "015cdf85804e2abcc34e528d73bcbba8", "score": "0.6217617", "text": "func TestCheckBinaryTypedExprFloat64RemRune32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % rune(0x7fffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 % rune(2147483647) (mismatched types float64 and rune)`,\n\t)\n\n}", "title": "" }, { "docid": "6d3e7537e09bfaccd7357e20b4b1ca21", "score": "0.6211539", "text": "func TestCheckBinaryTypedExprFloat64RemStringT(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) % string(\"abc\")`, env,\n\t\t`invalid operation: 4.29497e+09 % \"abc\" (mismatched types float64 and string)`,\n\t)\n\n}", "title": "" }, { "docid": "dfe0bb3665f8da89be55400eb00791b0", "score": "0.6191671", "text": "func TestCheckBinaryTypedExprFloat32RemInt(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % 4`, env,\n\t\t`invalid operation: 4.29497e+09 % 4 (operator % not defined on float32)`,\n\t)\n\n}", "title": "" }, { "docid": "96359fbc0d5d25fc3bf5e0faa91ba4bb", "score": "0.6191632", "text": "func TestCheckBinaryTypedExprInt8RemFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `int8(0x7f) % 2.0`, env, int8(0x7f) % 2.0, reflect.TypeOf(int8(0x7f) % 2.0))\n}", "title": "" }, { "docid": "28fda5861f91e1d947ac48e0f70df390", "score": "0.6184081", "text": "func TestCheckBinaryTypedExprUint64ShlFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) << float32(0xffffffff)`, env,\n\t\t`invalid operation: 18446744073709551615 << 4.29497e+09 (shift count type float32, must be unsigned integer)`,\n\t)\n\n}", "title": "" }, { "docid": "c128a465a2a2d387c6f2e5fd1962f9a0", "score": "0.6177253", "text": "func TestCheckBinaryTypedExprFloat64GtrUint64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float64(0xffffffff) > uint64(0xffffffffffffffff)`, env,\n\t\t`invalid operation: 4.29497e+09 > 18446744073709551615 (mismatched types float64 and uint64)`,\n\t)\n\n}", "title": "" }, { "docid": "60258f49eecb916249b78fba268e2e45", "score": "0.6175551", "text": "func IsMultipleOf64(v int64) bool { return v&63 == 0 }", "title": "" }, { "docid": "637ab28ed879324a5f7c76638d903928", "score": "0.6160352", "text": "func TestCheckBinaryTypedExprUint16ShlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint16(0xffff) << float64(0xffffffff)`, env,\n\t\t`invalid operation: 65535 << 4.29497e+09 (shift count type float64, must be unsigned integer)`,\n\t)\n\n}", "title": "" }, { "docid": "f2e3f0b8e2ee2f9e07170bf64c85139c", "score": "0.61594236", "text": "func TestCheckBinaryTypedExprInt16RemFloat32(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `int16(0x7fff) % float32(0xffffffff)`, env,\n\t\t`invalid operation: 32767 % 4.29497e+09 (mismatched types int16 and float32)`,\n\t)\n\n}", "title": "" }, { "docid": "af285e1a0408faaa3212839f38e250eb", "score": "0.6149802", "text": "func TestCheckBinaryTypedExprUint16EqlFloat64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint16(0xffff) == float64(0xffffffff)`, env,\n\t\t`invalid operation: 65535 == 4.29497e+09 (mismatched types uint16 and float64)`,\n\t)\n\n}", "title": "" }, { "docid": "9598a04e65a8770d7e8cab6a6a10e2f4", "score": "0.61489916", "text": "func TestCheckBinaryTypedExprUint64AddFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `uint64(0xffffffffffffffff) + 2.0`, env,\n\t\t`constant 18446744073709551617 overflows uint64`,\n\t)\n\n}", "title": "" }, { "docid": "f1bf92242ce9b859b9b62894429dc34c", "score": "0.61487734", "text": "func TestCheckBinaryTypedExprInt64GtrFloat(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectConst(t, `int64(0x7fffffffffffffff) > 2.0`, env, int64(0x7fffffffffffffff) > 2.0, reflect.TypeOf(int64(0x7fffffffffffffff) > 2.0))\n}", "title": "" }, { "docid": "0a754b618c46c0f8403fd75a28fdc957", "score": "0.61443627", "text": "func TestCheckBinaryTypedExprFloat32RemComplex64(t *testing.T) {\n\tenv := MakeSimpleEnv()\n\n\texpectCheckError(t, `float32(0xffffffff) % complex64(0xffffffff + 0xffffffff * 1i)`, env,\n\t\t`invalid operation: 4.29497e+09 % (4.29497e+09+4.29497e+09i) (mismatched types float32 and complex64)`,\n\t)\n\n}", "title": "" } ]
00535001edeff749536431ca01af03bd
BigIntSummation generates the summation of the values in stream. For example if stream generates the primes, BigIntSummation would generate 2, 5, 10, 17, ...
[ { "docid": "88fe86a83238aee91eb54e19ae250154", "score": "0.8656936", "text": "func BigIntSummation(stream BigIntStream) BigIntStream {\n\treturn &bigIntSumStream{\n\t\tstream: stream, nextVal: new(big.Int), sum: new(big.Int)}\n}", "title": "" } ]
[ { "docid": "18ba4eb81c12bc429c04daabb2e387ec", "score": "0.7164875", "text": "func IntSummation(stream IntStream) IntStream {\n\treturn &intSumStream{stream: stream}\n}", "title": "" }, { "docid": "cb6e6bb06faf2ad978d37c7842db8a54", "score": "0.5821734", "text": "func sum(arr []*big.Int) *big.Int {\n\tsum := new(big.Int)\n\tfor _, n := range arr {\n\t\tsum.Add(sum, n)\n\t}\n\treturn sum\n}", "title": "" }, { "docid": "9dd550d17fed3fb5a2ac2c419a1cfb7d", "score": "0.5485991", "text": "func (xxh xxHash) Sum(b []byte) []byte {\n\th64 := xxh.Sum64()\n\treturn append(b, byte(h64), byte(h64>>8), byte(h64>>16), byte(h64>>24), byte(h64>>32), byte(h64>>40), byte(h64>>48), byte(h64>>56))\n}", "title": "" }, { "docid": "d018c51c6ef0eab914679134ccc101f0", "score": "0.54422027", "text": "func (d *pmac) Sum(in []byte) []byte {\n\tif d.finished {\n\t\tpanic(\"pmac: already finished\")\n\t}\n\n\tif d.pos == block.Size {\n\t\txor(d.digest[:], d.buf[:])\n\t\txor(d.digest[:], d.lInv[:])\n\t} else {\n\t\txor(d.digest[:], d.buf[:d.pos])\n\t\td.digest[d.pos] ^= 0x80\n\t}\n\n\td.digest.Encrypt(d.c)\n\td.finished = true\n\n\treturn append(in, d.digest[:]...)\n}", "title": "" }, { "docid": "69b65be0f3ac24276fc82218b7c65f8e", "score": "0.54198915", "text": "func sum(x int64) *big.Int {\n\tfactor := x / divideFactor\n\tvar ret big.Int\n\tc := make(chan big.Int)\n\tvar i int64\n\tfor i = 1; i <= divideFactor; i++ {\n\t\tgo sumInner((i-1)*factor, i*factor, c)\n\t}\n\ti = 0\n\tfor i = 1; i <= divideFactor; i++ {\n\t\tnew := <-c\n\t\tret.Add(&ret, &new)\n\t}\n\treturn &ret\n}", "title": "" }, { "docid": "fd82aea4c5c6ce74638874d2654ff920", "score": "0.53991973", "text": "func SeqSum(x *big.Int) (res *big.Int) {\n\tif x.Cmp(B0) == 0 {\n\t\treturn B0\n\t}\n\tlx := big.NewInt(int64(math.Log2(float64(x.Int64()))))\n\tif lx.Mod(lx, B2).Cmp(B0) == 0 {\n\t\tres = seqSumEven(x)\n\t} else {\n\t\tres = seqSumOdd(x)\n\t}\n\n\treturn res\n}", "title": "" }, { "docid": "c52a89471b12067159086d039a6e60a1", "score": "0.53588045", "text": "func Problem20() {\n\tfact := big.NewInt(0)\n\tfact = fact.MulRange(1, 100)\n\tfacts := fact.String()\n\n\tvar sum int\n\tfor i := 0; i < len(facts); i++ {\n\t\tsum += int(facts[i]) - 48\n\t}\n\tfmt.Println(sum)\n}", "title": "" }, { "docid": "7191999d433dd2b17dd681ab77541b85", "score": "0.53232956", "text": "func (p *Payload) OctetStreamSum() (int64, int) {\n\tvar sum int64\n\tvar count int\n\n\tvisit := func(pth string, info os.FileInfo, err error) error {\n\t\tif !info.IsDir() {\n\t\t\tsum = sum + info.Size()\n\t\t\tcount = count + 1\n\t\t}\n\t\treturn err\n\t}\n\n\tfilepath.Walk(p.dir, visit)\n\n\treturn sum, count\n}", "title": "" }, { "docid": "b080cc8cf3b29284ad233499964e74be", "score": "0.5317849", "text": "func (i *identity) Sum(b []byte) []byte {\n\treturn append(b, i.data...)\n}", "title": "" }, { "docid": "55c8726257aa7c4e62505a765c7a7ca5", "score": "0.5299588", "text": "func factorial(n int) *big.Int {\n factVal := big.NewInt(1)\n if n < 0 {\n fmt.Print(\"Factorial of negative number doesn't exist.\")\n } else {\n for i := 1; i <= n; i++ {\n //factVal *= uint64(i) // mismatched types int64 and int\n factVal = factVal.Mul(factVal, big.NewInt(int64(i)))\n }\n }\n return factVal\n}", "title": "" }, { "docid": "60d1b317012c2da35087973b37c38932", "score": "0.52840817", "text": "func (d *digest) Sum(in []byte) []byte {\r\n\ts := d.Sum64()\r\n\treturn append(in, byte(s>>56), byte(s>>48), byte(s>>40), byte(s>>32), byte(s>>24), byte(s>>16), byte(s>>8), byte(s))\r\n}", "title": "" }, { "docid": "6998d83347cba97e6747a2a5c3e67c30", "score": "0.5279266", "text": "func (d *Avx512Digest) Sum(in []byte) (result []byte) {\n\n\tif d.final {\n\t\treturn append(in, d.result[:]...)\n\t}\n\n\ttrail := make([]byte, 0, 128)\n\ttrail = append(trail, d.x[:d.nx]...)\n\n\tlen := d.len\n\t// Padding. Add a 1 bit and 0 bits until 56 bytes mod 64.\n\tvar tmp [64]byte\n\ttmp[0] = 0x80\n\tif len%64 < 56 {\n\t\ttrail = append(trail, tmp[0:56-len%64]...)\n\t} else {\n\t\ttrail = append(trail, tmp[0:64+56-len%64]...)\n\t}\n\td.nx = 0\n\n\t// Length in bits.\n\tlen <<= 3\n\tfor i := uint(0); i < 8; i++ {\n\t\ttmp[i] = byte(len >> (56 - 8*i))\n\t}\n\ttrail = append(trail, tmp[0:8]...)\n\n\tsumCh := make(chan [Size]byte)\n\td.a512srv.blocksCh <- blockInput{uid: d.uid, msg: trail, final: true, sumCh: sumCh}\n\td.result = <-sumCh\n\td.final = true\n\treturn append(in, d.result[:]...)\n}", "title": "" }, { "docid": "14535d7a0e5ef81520986cb657277ec7", "score": "0.5257739", "text": "func Sum(n ...int) int {\n\ts := 0\n\tfor _, v := range n {\n\t\ts += v\n\t}\n\treturn s\n}", "title": "" }, { "docid": "95b1d8d23511a129f9ecef5167573453", "score": "0.5241388", "text": "func (xxh *xxHash) Sum64() uint64 {\n\tvar h64 uint64\n\tif xxh.totalLen >= 32 {\n\t\th64 = ((xxh.v1 << 1) | (xxh.v1 >> 63)) +\n\t\t\t((xxh.v2 << 7) | (xxh.v2 >> 57)) +\n\t\t\t((xxh.v3 << 12) | (xxh.v3 >> 52)) +\n\t\t\t((xxh.v4 << 18) | (xxh.v4 >> 46))\n\n\t\txxh.v1 *= prime64_2\n\t\th64 ^= ((xxh.v1 << 31) | (xxh.v1 >> 33)) * prime64_1\n\t\th64 = h64*prime64_1 + prime64_4\n\n\t\txxh.v2 *= prime64_2\n\t\th64 ^= ((xxh.v2 << 31) | (xxh.v2 >> 33)) * prime64_1\n\t\th64 = h64*prime64_1 + prime64_4\n\n\t\txxh.v3 *= prime64_2\n\t\th64 ^= ((xxh.v3 << 31) | (xxh.v3 >> 33)) * prime64_1\n\t\th64 = h64*prime64_1 + prime64_4\n\n\t\txxh.v4 *= prime64_2\n\t\th64 ^= ((xxh.v4 << 31) | (xxh.v4 >> 33)) * prime64_1\n\t\th64 = h64*prime64_1 + prime64_4 + xxh.totalLen\n\t} else {\n\t\th64 = xxh.seed + prime64_5 + xxh.totalLen\n\t}\n\n\tp := 0\n\tn := xxh.bufused\n\tfor n := n - 8; p <= n; p += 8 {\n\t\tp64 := (uint64(xxh.buf[p+7])<<56 | uint64(xxh.buf[p+6])<<48 | uint64(xxh.buf[p+5])<<40 | uint64(xxh.buf[p+4])<<32 | uint64(xxh.buf[p+3])<<24 | uint64(xxh.buf[p+2])<<16 | uint64(xxh.buf[p+1])<<8 | uint64(xxh.buf[p])) * prime64_2\n\t\th64 ^= ((p64 << 31) | (p64 >> 33)) * prime64_1\n\t\th64 = ((h64<<27)|(h64>>37))*prime64_1 + prime64_4\n\t}\n\tif p+4 <= n {\n\t\th64 ^= (uint64(xxh.buf[p+3])<<24 | uint64(xxh.buf[p+2])<<16 | uint64(xxh.buf[p+1])<<8 | uint64(xxh.buf[p])) * prime64_1\n\t\th64 = ((h64<<23)|(h64>>41))*prime64_2 + prime64_3\n\t\tp += 4\n\t}\n\tfor ; p < n; p++ {\n\t\th64 ^= uint64(xxh.buf[p]) * prime64_5\n\t\th64 = ((h64 << 11) | (h64 >> 53)) * prime64_1\n\t}\n\n\th64 ^= h64 >> 33\n\th64 *= prime64_2\n\th64 ^= h64 >> 29\n\th64 *= prime64_3\n\th64 ^= h64 >> 32\n\n\treturn h64\n}", "title": "" }, { "docid": "74ad6bd978981d46c93e630c0b5c7fdd", "score": "0.52341765", "text": "func Sum(xi ...int) int {\n\ts := 0\n\tfor _, v := range xi {\n\t\ts += v\n\t}\n\treturn s\n}", "title": "" }, { "docid": "983ab30a8472d34e41b2e4e636f3638c", "score": "0.52289253", "text": "func (m Multiples) Sum() int {\n\tvar output int\n\tfor _, i := range m {\n\t\toutput += i\n\t}\n\n\treturn output\n}", "title": "" }, { "docid": "07bf1dc8571e690ca4b4e04ffc95bb84", "score": "0.5186631", "text": "func squareRootsAndSum(w *lagrange) *big.Int {\n\tsum := new(big.Int)\n\tfor _, root := range w {\n\t\tsum.Add(sum, new(big.Int).Mul(root, root))\n\t}\n\n\treturn sum\n}", "title": "" }, { "docid": "6b1994e7e7fa2b7564370390605d322e", "score": "0.51849073", "text": "func DoSum() float64", "title": "" }, { "docid": "44cad250a4f18b0bd4fff5fee71fd70a", "score": "0.51429474", "text": "func main() {\n\tsum := 1\n\tfor ; sum < 1000; {\n\t\tsum += sum\n\t\tfmt.Println(sum)\n\t}\n\tfmt.Println(\"Total:\", sum)\n}", "title": "" }, { "docid": "60142e1f775fc8d6587ff5f76de8c3cc", "score": "0.5131548", "text": "func MapSum(itr Iterator) interface{} {\n\tn := float64(0)\n\tcount := 0\n\tvar resultType NumberType\n\tfor k, v := itr.Next(); k != -1; k, v = itr.Next() {\n\t\tcount++\n\t\tswitch n1 := v.(type) {\n\t\tcase float64:\n\t\t\tn += n1\n\t\tcase int64:\n\t\t\tn += float64(n1)\n\t\t\tresultType = Int64Type\n\t\t}\n\t}\n\tif count > 0 {\n\t\tswitch resultType {\n\t\tcase Float64Type:\n\t\t\treturn n\n\t\tcase Int64Type:\n\t\t\treturn int64(n)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e5e75b6e8fe11fb5454fc569a1e5d61e", "score": "0.5130126", "text": "func main() {\n\tn := 1000 - 1\n\tsum := numbers.SumOfMultiples(3, n) + numbers.SumOfMultiples(5, n) - numbers.SumOfMultiples(15, n)\n\n\tlog.Println(sum)\n}", "title": "" }, { "docid": "0178f7ee874d9cdb4e1af80973df1d7d", "score": "0.5127686", "text": "func IntBinomial(z *big.Int, n, k int64) *big.Int", "title": "" }, { "docid": "ffa99ba365ce8b18bc60fa78e7e514c3", "score": "0.5113884", "text": "func NewBigIntCounter(stream BigIntStream) *BigIntCounter {\n\tresult := &BigIntCounter{\n\t\tstream: stream,\n\t\tlastTaken: new(big.Int),\n\t}\n\tresult.stream.Next(result.lastTaken)\n\tresult.numTaken++\n\treturn result\n}", "title": "" }, { "docid": "768af32e1f17418ece4485a96a9836c3", "score": "0.5103793", "text": "func (s *State) Sum(b []byte) []byte {\n\ts.hash = Hash(s.tail, s.seed)\n\th := s.hash\n\treturn append(b, byte(h>>56), byte(h>>48), byte(h>>40), byte(h>>32), byte(h>>24), byte(h>>16), byte(h>>8), byte(h))\n}", "title": "" }, { "docid": "67743fdf670c59e6f09dd7fb3d6bc887", "score": "0.50774825", "text": "func (d *state) Sum(in []byte) []byte {\n\t// Make a copy of the original hash so that caller can keep writing\n\t// and summing.\n\tdup := d.clone()\n\thash := make([]byte, dup.outputLen)\n\tdup.Read(hash)\n\treturn append(in, hash...)\n}", "title": "" }, { "docid": "d51017b03bf39db57cd54715a4aca301", "score": "0.50585943", "text": "func (set Int64Set) Sum() int64 {\n\tsum := int64(0)\n\tfor v, _ := range set {\n\t\tsum = sum + v\n\t}\n\treturn sum\n}", "title": "" }, { "docid": "6ca882fb533bb741a3eaec9d75b54bcf", "score": "0.50216234", "text": "func sum(a, b LongInt) (c LongInt) {\n\n\tvar extra int\n\textra = 0\n\n\tc.size = max(a.size, b.size)\n\tfor i := 0; i < max(a.size, b.size); i++ {\n\n\t\tc.digits[i] = a.digits[i] + b.digits[i] + extra\n\t\textra = 0\n\n\t\tif c.digits[i] > 9 {\n\t\t\textra = c.digits[i]\n\t\t\tc.digits[i] = c.digits[i] % 10\n\t\t\textra = (extra - c.digits[i]) / 10\n\t\t}\n\t}\n\n\tif extra > 0 {\n\t\tc.size += 1\n\t\tc.digits[c.size-1] = extra\n\t\textra = 0\n\t}\n\n\treturn c\n}", "title": "" }, { "docid": "63739845115e09b05335aa6c2dec9b0f", "score": "0.5007489", "text": "func BigSum(addends []string) string {\n\n\tmaxLen := getMaxLen(addends)\n\tvar co uint64\n\tsum := \"\"\n\n\tfor i := 0; i < maxLen; i++ {\n\t\trem := uint64(0) + co\n\t\tfor _, addend := range addends {\n\t\t\taIndex := len(addend) - 1 - i\n\t\t\tif aIndex >= 0 {\n\t\t\t\trem += uint64(addend[aIndex] - 48)\n\t\t\t}\n\t\t}\n\t\tco = rem / 10\n\t\tsum = strconv.Itoa(int(rem%10)) + sum\n\t}\n\n\tif co > 0 {\n\t\tsum = strconv.Itoa(int(co)) + sum\n\t}\n\n\treturn sum\n}", "title": "" }, { "docid": "fbed175500f9f0656cab76472b10d73d", "score": "0.5004529", "text": "func sum(s []int, c chan int) {\n\tsum := 0\n\t// adds the numbers in the slice\n\tfor _, v := range s {\n\t\tsum += v\n\t}\n\tfmt.Println(\"Computation of\", s, \"must be:\", sum)\n\t// sends sum to channel c\n\tc <- sum\n}", "title": "" }, { "docid": "9db50c0d8cb14a644e3ac4c3189b23a4", "score": "0.5002224", "text": "func sumDigits(x *big.Int) *big.Int {\n\tten := big.NewInt(10)\n\tsum := big.NewInt(0)\n\tmod := big.NewInt(0)\n\n\tfor ten.Cmp(x) < 0 {\n\t\tsum.Add(sum, mod.Mod(x, ten))\n\t\tx.Div(x, ten)\n\t}\n\tsum.Add(sum, x)\n\treturn sum\n}", "title": "" }, { "docid": "d0e4b0265e4db5a40a6fcae8a9665444", "score": "0.49965778", "text": "func cumulativeSum() {\n\tN := scanInt()\n\ta := scanInts(N)\n\tvar ans, sum int\n\t// you can use mod of sum\n\tfor _, n := range a {\n\t\tsum += n\n\t\tsum %= mod\n\t}\n\tfor i := N - 1; i > 0; i-- {\n\t\t// in this case, if sum is negative number, you need add mod number\n\t\tsum -= a[i]\n\t\tif sum < 0 {\n\t\t\tsum += mod\n\t\t}\n\t\tans += sum * a[i]\n\t\tans %= mod\n\t}\n\tfmt.Println(ans)\n}", "title": "" }, { "docid": "461b112bbdd1c6911e70da56b2e2eda3", "score": "0.4983761", "text": "func (eval *evaluator) InnerSumLog(ctIn *Ciphertext, batchSize, n int, ctOut *Ciphertext) {\n\n\tringQ := eval.params.RingQ()\n\tringP := eval.params.RingP()\n\tringQP := rlwe.RingQP{RingQ: ringQ, RingP: ringP}\n\n\tlevelQ := ctIn.Level()\n\tlevelP := len(ringP.Modulus) - 1\n\n\t//QiOverF := eval.params.QiOverflowMargin(levelQ)\n\t//PiOverF := eval.params.PiOverflowMargin()\n\n\tif n == 1 {\n\t\tif ctIn != ctOut {\n\t\t\tring.CopyValuesLvl(levelQ, ctIn.Value[0], ctOut.Value[0])\n\t\t\tring.CopyValuesLvl(levelQ, ctIn.Value[1], ctOut.Value[1])\n\t\t}\n\t} else {\n\n\t\t// Memory pool for ctIn = ctIn + rot(ctIn, 2^i) in Q\n\t\ttmpc0 := eval.poolQMul[0] // unused memory pool from evaluator\n\t\ttmpc1 := eval.poolQMul[1] // unused memory pool from evaluator\n\n\t\ttmpc1.IsNTT = true\n\n\t\tc0OutQP := eval.Pool[2]\n\t\tc1OutQP := eval.Pool[3]\n\t\tc0QP := eval.Pool[4]\n\t\tc1QP := eval.Pool[5]\n\n\t\tstate := false\n\t\tcopy := true\n\t\t// Binary reading of the input n\n\t\tfor i, j := 0, n; j > 0; i, j = i+1, j>>1 {\n\n\t\t\t// Starts by decomposing the input ciphertext\n\t\t\tif i == 0 {\n\t\t\t\t// If first iteration, then copies directly from the input ciphertext that hasn't been rotated\n\t\t\t\teval.DecomposeNTT(levelQ, levelP, levelP+1, ctIn.Value[1], eval.PoolDecompQP)\n\t\t\t} else {\n\t\t\t\t// Else copies from the rotated input ciphertext\n\t\t\t\teval.DecomposeNTT(levelQ, levelP, levelP+1, tmpc1, eval.PoolDecompQP)\n\t\t\t}\n\n\t\t\t// If the binary reading scans a 1\n\t\t\tif j&1 == 1 {\n\n\t\t\t\tk := n - (n & ((2 << i) - 1))\n\t\t\t\tk *= batchSize\n\n\t\t\t\t// If the rotation is not zero\n\t\t\t\tif k != 0 {\n\n\t\t\t\t\t// Rotate((tmpc0, tmpc1), k)\n\t\t\t\t\tif i == 0 {\n\t\t\t\t\t\teval.PermuteNTTHoistedNoModDown(levelQ, ctIn.Value[0], eval.PoolDecompQP, k, c0QP.Q, c1QP.Q, c0QP.P, c1QP.P)\n\t\t\t\t\t} else {\n\t\t\t\t\t\teval.PermuteNTTHoistedNoModDown(levelQ, tmpc0, eval.PoolDecompQP, k, c0QP.Q, c1QP.Q, c0QP.P, c1QP.P)\n\t\t\t\t\t}\n\n\t\t\t\t\t// ctOut += Rotate((tmpc0, tmpc1), k)\n\t\t\t\t\tif copy {\n\t\t\t\t\t\tringQP.CopyValuesLvl(levelQ, levelP, c0QP, c0OutQP)\n\t\t\t\t\t\tringQP.CopyValuesLvl(levelQ, levelP, c1QP, c1OutQP)\n\t\t\t\t\t\tcopy = false\n\t\t\t\t\t} else {\n\t\t\t\t\t\tringQP.AddLvl(levelQ, levelP, c0OutQP, c0QP, c0OutQP)\n\t\t\t\t\t\tringQP.AddLvl(levelQ, levelP, c1OutQP, c1QP, c1OutQP)\n\t\t\t\t\t}\n\t\t\t\t} else {\n\n\t\t\t\t\tstate = true\n\n\t\t\t\t\t// if n is not a power of two\n\t\t\t\t\tif n&(n-1) != 0 {\n\t\t\t\t\t\teval.Baseconverter.ModDownQPtoQNTT(levelQ, levelP, c0OutQP.Q, c0OutQP.P, c0OutQP.Q) // Division by P\n\t\t\t\t\t\teval.Baseconverter.ModDownQPtoQNTT(levelQ, levelP, c1OutQP.Q, c1OutQP.P, c1OutQP.Q) // Division by P\n\n\t\t\t\t\t\t// ctOut += (tmpc0, tmpc1)\n\t\t\t\t\t\tringQ.AddLvl(levelQ, c0OutQP.Q, tmpc0, ctOut.Value[0])\n\t\t\t\t\t\tringQ.AddLvl(levelQ, c1OutQP.Q, tmpc1, ctOut.Value[1])\n\n\t\t\t\t\t} else {\n\t\t\t\t\t\tring.CopyValuesLvl(levelQ, tmpc0, ctOut.Value[0])\n\t\t\t\t\t\tring.CopyValuesLvl(levelQ, tmpc1, ctOut.Value[1])\n\t\t\t\t\t\tctOut.Value[0].IsNTT = true\n\t\t\t\t\t\tctOut.Value[1].IsNTT = true\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\n\t\t\tif !state {\n\t\t\t\tif i == 0 {\n\t\t\t\t\teval.PermuteNTTHoisted(levelQ, ctIn.Value[0], ctIn.Value[1], eval.PoolDecompQP, (1<<i)*batchSize, tmpc0, tmpc1)\n\t\t\t\t\tringQ.AddLvl(levelQ, tmpc0, ctIn.Value[0], tmpc0)\n\t\t\t\t\tringQ.AddLvl(levelQ, tmpc1, ctIn.Value[1], tmpc1)\n\t\t\t\t} else {\n\t\t\t\t\t// (tmpc0, tmpc1) = Rotate((tmpc0, tmpc1), 2^i)\n\t\t\t\t\teval.PermuteNTTHoisted(levelQ, tmpc0, tmpc1, eval.PoolDecompQP, (1<<i)*batchSize, c0QP.Q, c1QP.Q)\n\t\t\t\t\tringQ.AddLvl(levelQ, tmpc0, c0QP.Q, tmpc0)\n\t\t\t\t\tringQ.AddLvl(levelQ, tmpc1, c1QP.Q, tmpc1)\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "c5e93fd86016fcf9962e2fbc68e0dd5a", "score": "0.49806315", "text": "func mapSum(itr Iterator, m *mapper) {\n\tn := float64(0)\n\tfor k, v := itr.Next(); k != 0; k, v = itr.Next() {\n\t\tn += v.(float64)\n\t}\n\tm.emit(itr.Time(), n)\n}", "title": "" }, { "docid": "41a700323c6526002e89c410b15ba701", "score": "0.4976435", "text": "func (h SenHash) Sum(b []byte) []byte {\n\tb = append(b, h.blake512hasher.Sum(nil)[:32]...)\n\treturn b\n}", "title": "" }, { "docid": "187e1450fb72d459752a6f489d2c5e5d", "score": "0.49692523", "text": "func (d Digest64) Sum(b []byte) []byte {\n\th1 := d.Sum64()\n\treturn append(b,\n\t\tbyte(h1>>56), byte(h1>>48), byte(h1>>40), byte(h1>>32),\n\t\tbyte(h1>>24), byte(h1>>16), byte(h1>>8), byte(h1))\n}", "title": "" }, { "docid": "65cc1dc57ba19f56911faea8686f080e", "score": "0.49691626", "text": "func (h *Hash) Sum(b []byte) []byte {\n\tx := h.Sum64()\n\treturn append(b,\n\t\tbyte(x>>0),\n\t\tbyte(x>>8),\n\t\tbyte(x>>16),\n\t\tbyte(x>>24),\n\t\tbyte(x>>32),\n\t\tbyte(x>>40),\n\t\tbyte(x>>48),\n\t\tbyte(x>>56))\n}", "title": "" }, { "docid": "03fd3d9937719fb10cc446df6d4a16fb", "score": "0.49663556", "text": "func Jacobi(x, y *big.Int,) int", "title": "" }, { "docid": "ce8cdec6400a0291ebf551fd418fc20f", "score": "0.49579012", "text": "func sum(xi ...int) int {\n\tfmt.Printf(\"%T\\n\", xi)\n\ttotal := 0\n\tfor _, v := range xi {\n\t\ttotal += v\n\t}\n\treturn total\n}", "title": "" }, { "docid": "7784b70c99d027240309eee673c4a4ad", "score": "0.4945423", "text": "func Sum64(data []byte) uint64 { return Sum64WithSeed(data, 0) }", "title": "" }, { "docid": "84496f9fa02697445bbb13964ffa167c", "score": "0.49448127", "text": "func main() {\n\tdata, err := os.ReadFile(\"puzzle.txt\")\n\tif err != nil {\n\t\tlog.Fatal(\"File reading error\", err)\n\t\treturn\n\t}\n\n\tfileContent := strings.Split(string(data), \"\\n\")\n\n\tbigSum := new(big.Int)\n\tbigSum.SetString(\"0\", 10)\n\n\tfor _, value := range fileContent {\n\t\tbigNum, _ := new(big.Int).SetString(value, 10)\n\t\tbigSum.Add(bigSum, bigNum)\n\t}\n\n\tfmt.Println(\"Full sum:\")\n\tfmt.Println(bigSum)\n\tfmt.Println()\n\tstrBigSum := fmt.Sprintf(\"%s\", bigSum)\n\tfmt.Println(\"013/ First 10 digits:\")\n\tfmt.Println(strBigSum[0:10])\n}", "title": "" }, { "docid": "814a976fd40e78a37494ab48e82004fb", "score": "0.4944491", "text": "func f(n int) int {\n\tsum := 0\n\tfor _, d := range digits(n) {\n\t\tsum += factorial[d]\n\t}\n\treturn sum\n}", "title": "" }, { "docid": "f7d995cf60dc27cd3d2baccfd3d78d66", "score": "0.4943817", "text": "func sum(s []int, c chan int) {\n\tsum := 0\n\tfor _, v := range s {\n\t\tsum += v\n\t}\n\tc <- sum // send sum to c\n}", "title": "" }, { "docid": "12d41d876c756d1867065f5ccb41fcc3", "score": "0.4938527", "text": "func Accumulate(s []*big.Int) (r *big.Int) {\n\tr = big.NewInt(0)\n\tfor _, e := range s {\n\t\tr.Add(r, e)\n\t}\n\treturn\n}", "title": "" }, { "docid": "2784edfa466c33f27d792cd3e58758e8", "score": "0.49155885", "text": "func Sum(xs ...float64) float64 {\n\tvar s float64\n\tfor i := 0; i < len(xs); i++ {\n\t\ts += xs[i]\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "088a1186ec6d55516a02ff9fe259477c", "score": "0.4914749", "text": "func sumPrimes(max int) (sum int) {\n\ts := checkPrimes(max)\n\tfor i := 0; i <= max; i++ {\n\t\tif !s[i] {\n\t\t\tsum += i\n\t\t}\n\t}\n\treturn sum\n}", "title": "" }, { "docid": "5dc08d480decf6810676b272f4309ac6", "score": "0.48938307", "text": "func Sum(args ...int) (res int) {\n\tfor _, v := range args {\n\t\tres += v\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "c28ee3e9946da918a9fca942cf31ff8c", "score": "0.4893559", "text": "func Sum(in []int) (total int) {\n\ttotal = 0\n\tfor _, v := range in {\n\t\ttotal += v\n\t}\n\treturn\n}", "title": "" }, { "docid": "638dc30a7814bdffbacc1de7cc71bd64", "score": "0.48918366", "text": "func sum(x ...int) int {\n\tfmt.Println(x)\n\tfmt.Printf(\"%T\\n\", x)\n\ts := 0\n\tfor i, v := range x {\n\t\ts += v\n\t\tfmt.Println(\"for item number\", i, \"current sum:\", s)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "2a95b9091e9c78029523f820075b9b6f", "score": "0.48907846", "text": "func Sum(numbers ...int) (result int) {\n\n\tfor _, number := range numbers {\n\t\tresult += number\n\t}\n\n\treturn result\n}", "title": "" }, { "docid": "fc86cd132d754bd8617e7a1c22bc993a", "score": "0.48827097", "text": "func sum(xi ...int) int {\n\ttotal := 0\n\tfor _, v := range xi {\n\t\ttotal += v\n\t}\n\treturn total\n}", "title": "" }, { "docid": "46d8593a3e4b059c85ca8d4545036784", "score": "0.48720428", "text": "func (eval *evaluator) InnerSum(ctIn *Ciphertext, batchSize, n int, ctOut *Ciphertext) {\n\n\tringQ := eval.params.RingQ()\n\tringP := eval.params.RingP()\n\tringQP := rlwe.RingQP{RingQ: ringQ, RingP: ringP}\n\n\tlevelQ := ctIn.Level()\n\tlevelP := len(ringP.Modulus) - 1\n\n\tQiOverF := eval.params.QiOverflowMargin(levelQ) >> 1\n\tPiOverF := eval.params.PiOverflowMargin(levelP) >> 1\n\n\t// If sum with only the first element, then returns the input\n\tif n == 1 {\n\n\t\t// If the input-output points differ, copies on the output\n\t\tif ctIn != ctOut {\n\t\t\tring.CopyValuesLvl(levelQ, ctIn.Value[0], ctOut.Value[0])\n\t\t\tring.CopyValuesLvl(levelQ, ctIn.Value[1], ctOut.Value[1])\n\t\t}\n\t\t// If sum on at least two elements\n\t} else {\n\n\t\t// List of n-2 rotations\n\t\trotations := []int{}\n\t\tfor i := 1; i < n; i++ {\n\t\t\trotations = append(rotations, i*batchSize)\n\t\t}\n\n\t\t// Memory pool\n\t\ttmp0QP := eval.Pool[1]\n\t\ttmp1QP := eval.Pool[2]\n\n\t\t// Basis decomposition\n\t\teval.DecomposeNTT(levelQ, levelP, levelP+1, ctIn.Value[1], eval.PoolDecompQP)\n\n\t\t// Pre-rotates all [1, ..., n-1] rotations\n\t\t// Hoisted rotation without division by P\n\t\tctInRotQP := eval.RotateHoistedNoModDownNew(levelQ, rotations, ctIn.Value[0], eval.PoolDecompQP)\n\n\t\t// P*c0 -> tmp0QP.Q\n\t\tringQ.MulScalarBigintLvl(levelQ, ctIn.Value[0], ringP.ModulusBigint, tmp0QP.Q)\n\n\t\t// Adds phi_k(P*c0) on each of the vecRotQ\n\t\t// Does not need to add on the vecRotP because mod P === 0\n\t\tvar reduce int\n\t\t// Sums elements [2, ..., n-1]\n\t\tfor i := 1; i < n; i++ {\n\n\t\t\tj := i * batchSize\n\n\t\t\tif i == 1 {\n\t\t\t\tringQP.CopyValuesLvl(levelQ, levelP, ctInRotQP[j][0], tmp0QP)\n\t\t\t\tringQP.CopyValuesLvl(levelQ, levelP, ctInRotQP[j][1], tmp1QP)\n\t\t\t} else {\n\t\t\t\tringQP.AddNoModLvl(levelQ, levelP, tmp0QP, ctInRotQP[j][0], tmp0QP)\n\t\t\t\tringQP.AddNoModLvl(levelQ, levelP, tmp1QP, ctInRotQP[j][1], tmp1QP)\n\t\t\t}\n\n\t\t\tif reduce%QiOverF == QiOverF-1 {\n\t\t\t\tringQ.ReduceLvl(levelQ, tmp0QP.Q, tmp0QP.Q)\n\t\t\t\tringQ.ReduceLvl(levelQ, tmp1QP.Q, tmp1QP.Q)\n\t\t\t}\n\n\t\t\tif reduce%PiOverF == PiOverF-1 {\n\t\t\t\tringP.ReduceLvl(levelP, tmp0QP.P, tmp0QP.P)\n\t\t\t\tringP.ReduceLvl(levelP, tmp1QP.P, tmp1QP.P)\n\t\t\t}\n\n\t\t\treduce++\n\t\t}\n\n\t\tif reduce%QiOverF != 0 {\n\t\t\tringQ.ReduceLvl(levelQ, tmp0QP.Q, tmp0QP.Q)\n\t\t\tringQ.ReduceLvl(levelQ, tmp1QP.Q, tmp1QP.Q)\n\t\t}\n\n\t\tif reduce%PiOverF != 0 {\n\t\t\tringP.ReduceLvl(levelP, tmp0QP.P, tmp0QP.P)\n\t\t\tringP.ReduceLvl(levelP, tmp1QP.P, tmp1QP.P)\n\t\t}\n\n\t\t// Division by P of sum(elements [2, ..., n-1] )\n\t\teval.Baseconverter.ModDownQPtoQNTT(levelQ, levelP, tmp0QP.Q, tmp0QP.P, tmp0QP.Q) // sum_{i=1, n-1}(phi(d0))/P\n\t\teval.Baseconverter.ModDownQPtoQNTT(levelQ, levelP, tmp1QP.Q, tmp1QP.P, tmp1QP.Q) // sum_{i=1, n-1}(phi(d1))/P\n\n\t\t// Adds element[1] (which did not require rotation)\n\t\tringQ.AddLvl(levelQ, ctIn.Value[0], tmp0QP.Q, ctOut.Value[0]) // sum_{i=1, n-1}(phi(d0))/P + ct0\n\t\tringQ.AddLvl(levelQ, ctIn.Value[1], tmp1QP.Q, ctOut.Value[1]) // sum_{i=1, n-1}(phi(d1))/P + ct1\n\t}\n}", "title": "" }, { "docid": "9797770e688f4e36402dbbab9890c15d", "score": "0.48547864", "text": "func Sum(by []string, input []*oproto.ValueStream) []*oproto.ValueStream {\n\toutput := []*oproto.ValueStream{{Variable: input[0].Variable}}\n\tiPos := make([]int, len(input))\n\tfor {\n\t\tvalues := []float64{}\n\t\ttimestamps := []uint64{}\n\t\tfor i := 0; i < len(input); i++ {\n\t\t\tif iPos[i] >= len(input[i].Value) {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tif input[i] != nil {\n\t\t\t\tvalues = append(values, input[i].Value[iPos[i]].GetDouble())\n\t\t\t\ttimestamps = append(timestamps, input[i].Value[iPos[i]].Timestamp)\n\t\t\t}\n\t\t\tiPos[i]++\n\t\t}\n\t\tif len(values) == 0 {\n\t\t\tbreak\n\t\t}\n\t\tvar total float64\n\t\tfor _, i := range values {\n\t\t\ttotal += i\n\t\t}\n\t\tvar tsTotal uint64\n\t\tfor _, i := range timestamps {\n\t\t\ttsTotal += i\n\t\t}\n\t\toutput[0].Value = append(output[0].Value, value.NewDouble(tsTotal/uint64(len(timestamps)), total))\n\t}\n\treturn output\n}", "title": "" }, { "docid": "2e963f47459765a8c588452b3bdffc79", "score": "0.48442584", "text": "func Add(\n\ta, b ICalculable,\n\tfillValue interface{},\n) ICalculable {\n\topA := a.(BigIntSeries)\n\topB := b.(BigIntSeries)\n\texLen := int(math.Min(float64(len(opA)), float64(len(opB))))\n\tres := make(BigIntSeries, exLen)\n\tnumJobs := runtime.NumCPU() + 1\n\tseqLen := exLen / numJobs\n\thasExtra := 0\n\tif exLen%numJobs != 0 {\n\t\thasExtra++\n\t}\n\tfch := make(chan fragment, numJobs)\n\tvar w sync.WaitGroup\n\tw.Add(numJobs + hasExtra)\n\tfor i := 0; i < exLen; i += seqLen {\n\t\t_end := int(math.Min(float64(i+seqLen), float64(exLen)))\n\t\tgo func(\n\t\t\tpa, pb ICalculable,\n\t\t\toffset, end int,\n\t\t\twg *sync.WaitGroup,\n\t\t\tfret chan<- fragment,\n\t\t) {\n\t\t\tdefer wg.Done()\n\t\t\topPA := pa.(BigIntSeries)\n\t\t\topPB := pb.(BigIntSeries)\n\t\t\tpres := make(BigIntSeries, len(opPA))\n\t\t\tfor j := 0; j < len(pres); j++ {\n\t\t\t\tpres[j] = big.NewInt(0).Add(opPA[j], opPB[j])\n\t\t\t}\n\t\t\tfret <- fragment{\n\t\t\t\tOffset: offset,\n\t\t\t\tEnd: end,\n\t\t\t\tItems: &pres,\n\t\t\t}\n\t\t}(opA[i:_end], opB[i:_end], i, _end, &w, fch)\n\t}\n\tgo func(wg *sync.WaitGroup, ch chan fragment) {\n\t\twg.Wait()\n\t\tclose(ch)\n\t}(&w, fch)\n\tfor v := range fch {\n\t\tcopy(res[v.Offset:v.End], *v.Items.(*BigIntSeries))\n\t}\n\treturn res\n}", "title": "" }, { "docid": "3a23e75a84a21975f4691145cb6e5b03", "score": "0.4831801", "text": "func (a512srv *Avx512Server) Sum(uid uint64, p []byte) [32]byte {\n\tsumCh := make(chan [32]byte)\n\ta512srv.blocksCh <- blockInput{uid: uid, msg: p, final: true, sumCh: sumCh}\n\treturn <-sumCh\n}", "title": "" }, { "docid": "d35c257212fb01b870465e841bc5b699", "score": "0.48316845", "text": "func seqSumOdd(x *big.Int) (res *big.Int) {\n\tif x.Cmp(B2) == 0 {\n\t\treturn B3\n\t}\n\tif x.Cmp(B3) == 0 {\n\t\treturn big.NewInt(7)\n\t}\n\n\tlx := big.NewInt(int64(math.Log2(float64(x.Int64()))))\n\ti1_u := new(big.Int).Sub(B1, new(big.Int).Exp(Q, lx.Div(new(big.Int).Add(lx, B1), B2), nil))\n\ti1_d := new(big.Int).Sub(B1, Q)\n\ti1 := new(big.Int).Mul(i1_u.Div(i1_u, i1_d), B2)\n\n\tif i1.Cmp(x) < 0 { // Section B\n\t\tn := new(big.Int).Sub(x, i1)\n\t\ti1a2 := new(big.Int).Add(i1, B2)\n\t\tl_i := c_li(i1a2, n, D)\n\t\tres = new(big.Int).Add(APSum(B1, i1, B1), APSum(i1a2, l_i, D))\n\t} else { // Section A\n\t\tn := new(big.Int).Sub(i1, x)\n\t\tf_i := c_fi(i1, n, D)\n\t\tres = new(big.Int).Sub(APSum(B1, i1, B1), APSum(f_i, i1, D))\n\t}\n\treturn\n}", "title": "" }, { "docid": "8be9ef46c2a42dc40bb1509f0bef7f92", "score": "0.48309284", "text": "func IntAdd(z *big.Int, x, y *big.Int,) *big.Int", "title": "" }, { "docid": "f307f772079bce8a22b0391b8595dd27", "score": "0.48292798", "text": "func (h *Hash) Sum64() uint64 {\n\th.initSeed()\n\treturn rthash(&h.buf[0], h.n, h.state.s)\n}", "title": "" }, { "docid": "f11d6db048386d83bd42234b71c9ddad", "score": "0.4828708", "text": "func sum(size int) int {\n\tnumbers := make([]int, size) // never scape sum()\n\tfor i := range numbers {\n\t\tnumbers[i] = i + 1\n\t}\n\tvar sum int\n\tfor i := range numbers {\n\t\tsum += i\n\t}\n\n\treturn sum\n}", "title": "" }, { "docid": "b99bea46e36f99b711576dfcd1e41143", "score": "0.4828452", "text": "func sum(nums []int64) (sum int64) {\n\tfor _, v := range nums {\n\t\tsum += v\n\t}\n\treturn\n}", "title": "" }, { "docid": "474636f9f4256ada0a37c42807717a3a", "score": "0.48210242", "text": "func (s *server) Sum(ctx context.Context, request *proto.SumRequest) (*proto.SumResult, error) {\n\t// Receive array of ints from request and add them up\n\tresult, err := sum.Calculate(request.Numbers)\n\tif err != nil {\n\t\tos.Exit(1)\n\t}\n\t// Send back result in response\n\treturn &proto.SumResult{Result: result}, nil\n}", "title": "" }, { "docid": "c15102258c8d34f6064b911ae4319111", "score": "0.4818665", "text": "func main() {\n\n\tvar num = 0// creates num aas int \n\tvar total = 0// creates total aas int \n\tvar factorial = 0// creates factorial aas int \n\t\n\t//factorial := big.NewInt(0) creates big int \n\t\n\n\tfmt.Println(\"Please Enter a number:\")//input number \n\tfmt.Scanf(\"%d\", &num)//scans number\n\n\n\tif num <= 0{\n\t\tfmt.Println(\"Number cannot be less than 0!\")\n\t\tfor num <= 0{\n\t\t\tfmt.Println(\"Please Enter a number greater than zero:\")//input number \n\t\t\tfmt.Scanf(\"%d\", &num)//scans number\n\t\t\tfmt.Scan(\"%d\", &num)\n\t\t}\n\t}\n\t\n\n\tfor i := 1; i <= num; i++{\n\t\tfactorial = factorial * i//makes the factorial equal too the factorial * i \n\t\ttotal = total + i\n\t\n\t}\n\tfor i := 1; i <= num; i++{\n\t\t\tfactorial = factorial * i//makes the factorial equal too the factorial * i \n\t\t\ttotal = total + i\n\t}\n\t\n\t\n\tfmt.Println(\"Number Factorial:\", factorial)//prints factorial to screen\n\tfmt.Println(\"Sum of Factorial:\", total)//prints total to screen\n\n}", "title": "" }, { "docid": "84ef5b7ef5ab564c24e9dbef26018735", "score": "0.48110965", "text": "func p256Sum(out, in, in2 *[p256Limbs]uint32) {\n\tcarry := uint32(0)\n\tfor i := 0; ; i++ {\n\t\tout[i] = in[i] + in2[i]\n\t\tout[i] += carry\n\t\tcarry = out[i] >> 29\n\t\tout[i] &= bottom29Bits\n\n\t\ti++\n\t\tif i == p256Limbs {\n\t\t\tbreak\n\t\t}\n\n\t\tout[i] = in[i] + in2[i]\n\t\tout[i] += carry\n\t\tcarry = out[i] >> 28\n\t\tout[i] &= bottom28Bits\n\t}\n\n\tp256ReduceCarry(out, carry)\n}", "title": "" }, { "docid": "657cd32f96cacd760b3b775c8e8d37f7", "score": "0.4805179", "text": "func (info Scalar) SumInt64(e *Config, key *keys.Int64) {\n\tdata := &Int64Data{Info: &info, key: key}\n\te.subscribe(key, data.sum)\n}", "title": "" }, { "docid": "c51c7d39b4ff7ebf6bd403a35a29fe4c", "score": "0.4801816", "text": "func (s *singleton) Sum(number int) int {\n\ts.number += number\n\treturn s.number\n}", "title": "" }, { "docid": "45caf85be5e96db1c5e1fef2eb732abc", "score": "0.48014972", "text": "func sum(numbers chan int) int {\n\tacc := 0\n\tfor v := range numbers {\n\t\tfmt.Printf(\"Got doubled value %d \\n\", v)\n\t\tacc += v\n\t}\n\treturn acc\n}", "title": "" }, { "docid": "27357e2739530b4737c9598da3b28a75", "score": "0.48011884", "text": "func (bh *BuzHash) Sum(b []byte) []byte {\n\tvar buf bytes.Buffer\n\tbinary.Write(&buf, binary.LittleEndian, bh.state)\n\thash := buf.Bytes()\n\tfor _, hb := range hash {\n\t\tb = append(b, hb)\n\t}\n\n\treturn b\n}", "title": "" }, { "docid": "081c7845e18fe22c13612c48ca71455f", "score": "0.47997", "text": "func sum(msg string, values ...int) *int {\n\t// fmt.Println(values)\n\t// fmt.Printf(\"%T\\n\", values)\n\tresult := 0\n\tfor _, v := range values {\n\t\tresult += v\n\t}\n\t// fmt.Println(msg, result)\n\t// return result\n\n\t// In other languages the local stack of a function is destroyed when the function is done\n\t// executing. Golang saves this on a shared memory(heap memory) before destroying the local stack\n\treturn &result\n}", "title": "" }, { "docid": "30e4c1457f4418dd9868d271babcd3dd", "score": "0.479542", "text": "func (l *BigInt) Add(r Number) Number {\n\tif ri, ok := r.(*BigInt); ok {\n\t\tlb := (*big.Int)(l)\n\t\trb := (*big.Int)(ri)\n\t\tres := new(big.Int).Add(lb, rb)\n\t\treturn maybeInteger(res)\n\t}\n\tlp, rp := purify(l, r)\n\treturn lp.Add(rp)\n}", "title": "" }, { "docid": "5dfe5e1791fef182420906f1cd28d8f2", "score": "0.47953275", "text": "func sumFrom(min int64, max int64, resultChannel chan int64) {\r\n\tvar sum int64\r\n\r\n\tfor i := min; i <= max; i++ {\r\n\t\tsum += i\r\n\t}\r\n\r\n\tresultChannel <- sum\r\n}", "title": "" }, { "docid": "7dcb15b0bb49380d1717b98ef8f3a62c", "score": "0.4792865", "text": "func (d *RabinKarp64) Sum(b []byte) []byte {\n\tv := d.Sum64()\n\treturn append(b, byte(v>>56), byte(v>>48), byte(v>>40), byte(v>>32), byte(v>>24), byte(v>>16), byte(v>>8), byte(v))\n}", "title": "" }, { "docid": "4b98b8234fb147720e66ca49456e1387", "score": "0.47928205", "text": "func (x *Secp256k1N) Int() *big.Int {\n\tret := big.NewInt(0)\n\tn, _ := big.NewInt(0).SetString(\"FFFFFFFFFFFFFFFFFFFFFFFFFFFFFFFEBAAEDCE6AF48A03BBFD25E8CD0364141\", 16)\n\n\tfor i := range x.limbs {\n\t\tret.Lsh(ret, 52)\n\t\tret.Add(ret, big.NewInt(0).SetUint64(x.limbs[4-i]))\n\t}\n\tret.Mod(ret, n)\n\n\treturn ret\n}", "title": "" }, { "docid": "f887159323ecf5973d518140085e6c38", "score": "0.47771817", "text": "func Sum(numbers []int) (rs int) {\n\tfor _, number := range numbers {\n\t\trs += number\n\t}\n\treturn\n}", "title": "" }, { "docid": "d1ca83b42003209e36cff844d7a11e27", "score": "0.4771844", "text": "func Sum(numbers ...int) (sum int) {\n\tfor _, n := range numbers {\n\t\tsum += n\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "5824ee97a6917a57d7725264f6106740", "score": "0.47682232", "text": "func TestBigIntMatchesMathBigInt15(t *testing.T) {\n\tt.Run(\"FillBytes\", func(t *testing.T) {\n\t\tapd := func(z number) []byte {\n\t\t\treturn z.toApd(t).FillBytes(make([]byte, len(z)))\n\t\t}\n\t\tmath := func(z number) []byte {\n\t\t\treturn z.toMath(t).FillBytes(make([]byte, len(z)))\n\t\t}\n\t\trequire(t, quick.CheckEqual(apd, math, nil))\n\t})\n}", "title": "" }, { "docid": "c08719299a5d8896737ff189a5f2d4a8", "score": "0.47640777", "text": "func sum(x ...int) int {\n\tfmt.Println(x)\n\tfmt.Printf(\"%T\\n\", x)\n\tsum := 0\n\tfor _, v := range x {\n\t\tsum += v\n\t}\n\treturn sum\n}", "title": "" }, { "docid": "c08719299a5d8896737ff189a5f2d4a8", "score": "0.47640777", "text": "func sum(x ...int) int {\n\tfmt.Println(x)\n\tfmt.Printf(\"%T\\n\", x)\n\tsum := 0\n\tfor _, v := range x {\n\t\tsum += v\n\t}\n\treturn sum\n}", "title": "" }, { "docid": "5c6ca696b5519fd4bb432c3e01299307", "score": "0.47633943", "text": "func fact(a int) *big.Int {\n\tb := big.NewInt(1)\n\n\tfor i := a; i > 1; i-- {\n\t\tb = b.Mul(b, big.NewInt(int64(i)))\n\t}\n\n\treturn b\n}", "title": "" }, { "docid": "892d20d79ccad50cd40059f1a189e7f8", "score": "0.47593006", "text": "func main() {\n\tfmt.Println(nSum(3))\n}", "title": "" }, { "docid": "34a1a3d8f06ab72f7bca23330bc76e18", "score": "0.47506446", "text": "func (d Digest128) Sum(b []byte) []byte {\n\th1, h2 := d.Sum128()\n\treturn append(b,\n\t\tbyte(h1>>56), byte(h1>>48), byte(h1>>40), byte(h1>>32),\n\t\tbyte(h1>>24), byte(h1>>16), byte(h1>>8), byte(h1),\n\n\t\tbyte(h2>>56), byte(h2>>48), byte(h2>>40), byte(h2>>32),\n\t\tbyte(h2>>24), byte(h2>>16), byte(h2>>8), byte(h2),\n\t)\n}", "title": "" }, { "docid": "4f29bdf433c3d6d8d473da1c0fccf126", "score": "0.47503617", "text": "func Sum(a ...int) int {\n\tsum := 0\n\tfor _, i := range a {\n\t\tsum += i\n\t}\n\treturn sum\n}", "title": "" }, { "docid": "b5f101390a5891f9f30cae5a9d56e6d8", "score": "0.47438526", "text": "func BenchmarkBigIntAddModN(b *testing.B) {\n\tbufs := benchmarkVals()\n\tv1 := new(big.Int).SetBytes(bufs[0])\n\tv2 := new(big.Int).SetBytes(bufs[1])\n\n\tb.ReportAllocs()\n\tb.ResetTimer()\n\tfor i := 0; i < b.N; i++ {\n\t\tresult := new(big.Int).Add(v1, v2)\n\t\tresult.Mod(result, curveParams.N)\n\t}\n}", "title": "" }, { "docid": "beb0e4b18b42b4e2d7a7fcf1c8c76066", "score": "0.47423404", "text": "func (s *State) Sum64() uint64 {\n\ts.hash = Hash(s.tail, s.seed)\n\treturn s.hash\n}", "title": "" }, { "docid": "e91dd9878fa3a17ffa20d08137113f40", "score": "0.47410217", "text": "func sum(integers ...int) int {\n\tvar s int\n\ts = 0\n\n\tfor _, i := range integers {\n\t\ts += i\n\t}\n\n\treturn s\n}", "title": "" }, { "docid": "1bc891bd6a8fd744574b65302537754a", "score": "0.47282532", "text": "func (c *Aggregator) Sum() (number.Number, error) {\n\treturn c.value, nil\n}", "title": "" }, { "docid": "3e27f58874da7a05ef9f359710ecfb1c", "score": "0.4725095", "text": "func Factorial(n int64) *big.Int {\n\tif n == 0 {\n\t\treturn big.NewInt(1)\n\t}\n\n\tset := []string{}\n\tfor i := n; i > 0; i-- {\n\t\tset = append(set, strconv.FormatInt(i, 10))\n\t}\n\treturn total.BigProduct(set)\n}", "title": "" }, { "docid": "7cc8a6dbe79143804b46a51ba77a827e", "score": "0.47218123", "text": "func (c *Aggregator) Sum() (number.Number, error) {\n\treturn c.state.sum, nil\n}", "title": "" }, { "docid": "40184d3723b43c353eba46e589584ccb", "score": "0.4715466", "text": "func Sum64(b []byte) uint64", "title": "" }, { "docid": "c5c6c216e17bab6037bcce3a048bfd3b", "score": "0.47146523", "text": "func (p polynomial) solve(x *big.Int) (y *big.Int) {\n\ty = new(big.Int)\n\tfor _, m := range p.monomials {\n\t\ty = new(big.Int).Add(y, m.solve(x))\n\t}\n\treturn\n}", "title": "" }, { "docid": "244e46deba01546025868ae4d9a756fd", "score": "0.47115526", "text": "func (ctx Context) AddInf(inputs ...chan float64) (output chan float64) {\n\toutput = make(chan float64, ctx.StreamBufferSize)\n\n\tgo func() {\n\t\tdefer close(output)\n\n\t\tfor sum := range inputs[0] {\n\t\t\tfor _, input := range inputs[1:] {\n\t\t\t\tsum += <-input\n\t\t\t}\n\n\t\t\toutput <- sum\n\t\t}\n\t}()\n\n\treturn output\n}", "title": "" }, { "docid": "5d41d7f74bb34adc0b96365aaf539b2d", "score": "0.4711379", "text": "func (ctx Context) AppendStream(inputs chan chan float64) (output chan float64) {\n\toutput = make(chan float64, ctx.StreamBufferSize)\n\n\tgo func() {\n\t\tdefer close(output)\n\n\t\tfor input := range inputs {\n\t\t\tfor x := range input {\n\t\t\t\toutput <- x\n\t\t\t}\n\t\t}\n\t}()\n\n\treturn output\n}", "title": "" }, { "docid": "eb1facb11188461fd96d118c5797ebe7", "score": "0.47090662", "text": "func sum(nums ...int) int {\n\ts := 0\n\tfor _, n := range nums {\n\t\ts += n\n\t}\n\treturn s\n}", "title": "" }, { "docid": "579386257217edfca3e32bac613f8e13", "score": "0.47012362", "text": "func (group *QRRSA) Add(x, y *big.Int) *big.Int {\n\tr := new(big.Int)\n\tr.Add(x, y)\n\treturn r.Mod(r, group.N)\n}", "title": "" }, { "docid": "cfce407c94269cd6244254d5cea6ed77", "score": "0.46969646", "text": "func LogBitSum(w uint64) int {\n\t// Iteration in log2(n), n=64 -> 6 iterations\n\tmask := [6]uint64{\n\t\t0x5555555555555555, // 01010101...01010101\n\t\t0x3333333333333333, // 00110011...00110011\n\t\t0x0F0F0F0F0F0F0F0F, // 00001111...00001111\n\t\t0x00FF00FF00FF00FF, // ...\n\t\t0x0000FFFF0000FFFF,\n\t\t0x00000000FFFFFFFF, // 00000000...11111111\n\t}\n\tvar i uint64\n\tvar even, odd uint64\n\n\tj := 1\n\tfor i = 0; i < 6; i++ {\n\t\teven = w & mask[i]\n\t\t// Shift w right 2^i bits: 1, 2, 4, 8, 16, 32\n\t\tw >>= j\n\t\t// j = 2, 4, 8, 16, 32\n\t\tj <<= 1\n\t\todd = w & mask[i]\n\t\tw = even + odd\n\t}\n\treturn int(w)\n}", "title": "" }, { "docid": "d88655f3a4693249da58a36d1a7c68cf", "score": "0.46943322", "text": "func (b *Blueprint) BigInteger(column string, autoIncrement, unsigned bool) *ColumnDefinition {\n\treturn b.addColumn(\"bigInteger\", column, &ColumnOptions{\n\t\tautoIncrement: autoIncrement,\n\t\tunsigned: unsigned,\n\t})\n}", "title": "" }, { "docid": "b2be4ad874fa9778241e24151d088d05", "score": "0.46923056", "text": "func main() {\n\tvar n int\n\tfmt.Print(\"Enter the value of N: \")\n\tfmt.Scan(&n)\n\tsum := 0\n\tfor i := 1; i <= n; i++ {\n\t\tsum += i\n\t}\n\tfmt.Print(\"Sum : \", sum, \"\\n\")\n}", "title": "" }, { "docid": "2e3265515bad5efa0295b4397f04bd2f", "score": "0.46917385", "text": "func SumSigns(signs [][]byte) []byte {\n\tsum := new(big.Int)\n\tfor _, sign := range signs {\n\t\tsb := new(big.Int).SetBytes(sign)\n\t\tsum = new(big.Int).Add(sum, sb)\n\t}\n\treturn sum.Bytes()\n}", "title": "" }, { "docid": "eff2b788a4cc2201ffb0152edfa89e9b", "score": "0.46905842", "text": "func main() {\n\n\tcollector := make(chan uint64)\n\tcount := 1000\n\tvar wg sync.WaitGroup\n\n\tfor i := 0; i < count; i++ {\n\t\tnums := make([]byte, 10000)\n\t\t// create a bunch of random numbers\n\t\trand.Read(nums)\n\t\twg.Add(1)\n\n\t\t// Sum each subseries in a seperate gorouting\n\t\tgo func(nums []byte, ch chan<- uint64, wg *sync.WaitGroup) {\n\t\t\tdefer wg.Done()\n\t\t\tvar sum uint64\n\n\t\t\tfor _, v := range nums {\n\t\t\t\tsum += uint64(v)\n\t\t\t}\n\t\t\tch <- sum\n\t\t}(nums, collector, &wg)\n\t}\n\n\t// Collect all the results, and print them when we've recieved them\n\t// all.\n\tgo func(ch <-chan uint64) {\n\t\tvar sum uint64\n\n\t\tfor subsum := range ch {\n\t\t\tsum += subsum\n\t\t}\n\n\t\t// print sum when we have all our results\n\t\tfmt.Printf(\"Sum = %d\\n\", sum)\n\t}(collector)\n\n\twg.Wait()\n\tclose(collector)\n\n}", "title": "" }, { "docid": "a91dce5fd8ea49a8991002b164c4c546", "score": "0.4690165", "text": "func Add(addend1, addend2 *big.Int) *big.Int { return I().Add(addend1, addend2) }", "title": "" }, { "docid": "2d4b346194ac59ec264c48eff54b5bf5", "score": "0.46864322", "text": "func MyFactorial(innum int) uint64 {\n\tvar fact uint64 = 1\n\tfmt.Println(\"Something\")\n\n\tfor i := innum; i >= 1; i-- {\n\t\tui := uint64(i)\n\t\tfmt.Println(\"uint(innum): \",ui)\n\t\tfact *= ui\n\t\tfmt.Println(\"The factorial is: \", fact)\n\t}\n\treturn fact\n}", "title": "" }, { "docid": "27de212789c00189c99ecc759b762057", "score": "0.4680775", "text": "func Sum(bz []byte) []byte {\n\thash := sha256.Sum256(bz)\n\treturn hash[:20]\n}", "title": "" } ]
ef2ae61573bc98f0c3a38bbf1e8ab37a
OrderedBy returns a Sorter that sorts using the less functions, in order. Call its Sort method to sort the data.
[ { "docid": "75298f6864347713af4b8163ff410f3c", "score": "0.7719327", "text": "func OrderedBy(less ...lessFunc) *multiSorter {\n\treturn &multiSorter{\n\t\tless: less,\n\t}\n}", "title": "" } ]
[ { "docid": "33c105e640ef250a545dec3bd15d5f06", "score": "0.7745591", "text": "func OrderedBy(less ...lessFunc) *MultiSorter {\n\treturn &MultiSorter{\n\t\tfilms: nil,\n\t\tlessFuncs: less,\n\t}\n}", "title": "" }, { "docid": "3b8baec9d430ea675e70e2e77af8440b", "score": "0.71469694", "text": "func OrderedBy(less ...lessFunc) *MultiKeySorter {\n\treturn &MultiKeySorter{\n\t\tless: less,\n\t}\n}", "title": "" }, { "docid": "5121015fb52f1c28dc5009835647701e", "score": "0.6552522", "text": "func orderBy(lf ...lessFunc) *multiSorter {\n\tms := &multiSorter{}\n\tms.lessFunctions = lf\n\treturn ms\n}", "title": "" }, { "docid": "d4ad95c37cb193eb9b2d8824c03204f7", "score": "0.6315364", "text": "func SortLess(x LessSwapper) {\n\tn := x.Len()\n\tminmax := func(i, j int) {\n\t\tif x.Less(j, i) {\n\t\t\tx.Swap(j, i)\n\t\t}\n\t}\n\tsortFunc(n, minmax)\n}", "title": "" }, { "docid": "63834049b5fa3122bc9dc0ab7f94a73c", "score": "0.6307018", "text": "func BrokersOrderedBy(less ...lessFunc) *multiSorter {\n\treturn &multiSorter{\n\t\tless: less,\n\t}\n}", "title": "" }, { "docid": "cd5d84c9babc0856c21f8a41c06037a2", "score": "0.6047617", "text": "func (a addonSorter) Less(i, j int) bool {\n\tif a[i].Meta.LoadPriority == a[j].Meta.LoadPriority {\n\t\treturn strings.ToLower(a[i].Meta.Name) < strings.ToLower(a[j].Meta.Name)\n\t}\n\treturn a[i].Meta.LoadPriority < a[j].Meta.LoadPriority\n}", "title": "" }, { "docid": "1db083af2987ffb80410664b12ff284c", "score": "0.59402657", "text": "func (s *RecommendDataSorter) Less(i, j int) bool {\n\treturn s.By(s.Datas[i], s.Datas[j])\n}", "title": "" }, { "docid": "56f03826ea0cb91e19d2d223004ad868", "score": "0.5911904", "text": "func Sorter(h Handler) Handler {\n\treturn func(page Page) error {\n\t\tpage.Sort()\n\t\treturn h(page)\n\t}\n}", "title": "" }, { "docid": "7d441b771bd6c503aef4035b72ae5661", "score": "0.5811962", "text": "func Sort(data Sorter) {\n\tfor pass := 1; pass < data.Len(); pass++ {\n\t\tfor i := 0; i < data.Len()-pass; i++ {\n\t\t\tif data.Less(i+1, i) {\n\t\t\t\tdata.Swap(i, i+1)\n\t\t\t}\n\t\t}\n\t}\n}", "title": "" }, { "docid": "a3632e39c534aba8daa64e0321dcd6ec", "score": "0.58002865", "text": "func (by By) Sort(d Datapoints) {\n\tds := &datapointSorter{\n\t\tDatapoints: d,\n\t\tby: by,\n\t}\n\tsort.Sort(ds)\n}", "title": "" }, { "docid": "904c4921ff659d0b5a207ea888603476", "score": "0.5741317", "text": "func (s EncryptedChatClassArray) Sort(less func(a, b EncryptedChatClass) bool) EncryptedChatClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "758cfea0411384d9a125c2031435c30d", "score": "0.5738034", "text": "func (l DriverInfoList) Less(i, j int) bool { return l[i].Order < l[j].Order }", "title": "" }, { "docid": "c6773f2de7c660bb3119817cc8e58af2", "score": "0.5693613", "text": "func (this byDmnInfo) Less(i, j int) bool {\n\n\tif this[i].Name != this[j].Name {\n\t\treturn this[i].Name < this[j].Name\n\t} else if this[i].Key != this[j].Key {\n\t\treturn this[i].Key < this[j].Key\n\t} else if this[i].Version != this[j].Version {\n\t\treturn this[i].Version < this[j].Version\n\t} else {\n\t\treturn this[i].Id < this[j].Id\n\t}\n}", "title": "" }, { "docid": "808718ebdafa72d177c7f2d2dfd9ee10", "score": "0.56800246", "text": "func (c *Category) SortBy() string {\n\treturn \"position\"\n}", "title": "" }, { "docid": "294dd684da5571557da06bf6492992fa", "score": "0.5671832", "text": "func (by eventsBy) Sort(events []store.Event) {\n\tps := &eventSorter{\n\t\tevents: events,\n\t\tby: by, // The Sort method's receiver is the function (closure) that defines the sort order.\n\t}\n\tsort.Sort(ps)\n}", "title": "" }, { "docid": "371525a408e50b800165cfd2f692c443", "score": "0.56598127", "text": "func (s bulkFetchDataSorter) Less(i, j int) bool {\n\tif s[i].blockFileNum < s[j].blockFileNum {\n\t\treturn true\n\t}\n\tif s[i].blockFileNum > s[j].blockFileNum {\n\t\treturn false\n\t}\n\n\treturn s[i].fileOffset < s[j].fileOffset\n}", "title": "" }, { "docid": "746d63246467e1ffa5134b0262253e81", "score": "0.56437635", "text": "func (s SecurePlainDataClassArray) Sort(less func(a, b SecurePlainDataClass) bool) SecurePlainDataClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "07a4439a8ee0068475523a87d1ef8e08", "score": "0.563159", "text": "func (this *DmnList) Sort() {\n\tsort.Stable(byDmnInfo(*this))\n}", "title": "" }, { "docid": "39d0793eb911100337fa0525065ad017", "score": "0.56233233", "text": "func (by By) Sort(deps []Departure) {\n\tps := &depSorter{\n\t\tdeps: deps,\n\t\tby: by,\n\t}\n\tsort.Sort(ps)\n}", "title": "" }, { "docid": "8dbe46a2ef34d499dc6bd2f3956d40b8", "score": "0.5619537", "text": "func (w *Wrapper) OrderBy(column string, args ...interface{}) *Wrapper {\n\tw.orders = append(w.orders, order{\n\t\tcolumn: column,\n\t\targs: args,\n\t})\n\treturn w\n}", "title": "" }, { "docid": "288fef5f4d3da76ba637545d26e828d7", "score": "0.56112427", "text": "func SortBy(slice AnySlice, f IterFunc) {\n\tmustBeSlice(slice)\n\tfVal := reflect.ValueOf(f)\n\tif fVal.Kind() != reflect.Func {\n\t\tpanic(\"enumerable: SortBy was given a non-function instead of a function\")\n\t}\n\n\tsliceVal := reflect.ValueOf(slice)\n\tsort.Slice(slice, func(i, j int) bool {\n\t\treturn less(\n\t\t\tfVal.Call([]reflect.Value{sliceVal.Index(i)})[0].Interface(),\n\t\t\tfVal.Call([]reflect.Value{sliceVal.Index(j)})[0].Interface(),\n\t\t)\n\t})\n}", "title": "" }, { "docid": "f2870dab12fd6173b177971f7c7e62bd", "score": "0.5610633", "text": "func Less(lhs, rhs Expression) Expression {\n\treturn NewCall(\"less\", []Expression{lhs, rhs}, nil)\n}", "title": "" }, { "docid": "9f967725da3757c1d995f5d8642b847e", "score": "0.55924207", "text": "func Sort(deck []Card, less func(int, int) bool) []Card {\n\tsort.Slice(deck, less)\n\treturn deck\n}", "title": "" }, { "docid": "745753822177a61d4f95437deb86d056", "score": "0.5571598", "text": "func less(data []Result) func(i, j int) bool {\n\treturn func(i, j int) bool {\n\t\tif data[i].Status == data[j].Status {\n\t\t\treturn data[i].Name < data[j].Name\n\t\t}\n\t\treturn data[i].Status > data[j].Status\n\t}\n}", "title": "" }, { "docid": "856560d690a6590342ed64d8a52a8c05", "score": "0.55711854", "text": "func (s Sorter) Less(x, y interface{}) bool {\n\tswitch x.(type) {\n\tcase int:\n\t\ta, b := x.(int), y.(int)\n\t\tif a > b {\n\t\t\treturn false\n\t\t}\n\tcase string:\n\t\ta, b := x.(string), y.(string)\n\t\tif a > b {\n\t\t\treturn false\n\t\t}\n\tcase float64:\n\t\ta, b := x.(float64), y.(float64)\n\t\tif a > b {\n\t\t\treturn false\n\t\t}\n\tcase float32:\n\t\ta, b := x.(float32), y.(float32)\n\t\tif a > b {\n\t\t\treturn false\n\t\t}\n\tcase nil:\n\t\tpanic(\"nil types cant compare\")\n\tdefault:\n\t\tpanic(\"unhandled types\")\n\t}\n\treturn true\n}", "title": "" }, { "docid": "660ffed137080e0550c053ebc5cf6a51", "score": "0.55436707", "text": "func (s EncryptedChatArray) Sort(less func(a, b EncryptedChat) bool) EncryptedChatArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "81ea4ca54681d3e40b6f79479c523b5a", "score": "0.5528743", "text": "func Sort(s Stack, lessFunc func(first, second interface{}) bool) {\n\tvar p interface{}\n\tt := New()\n\tt.Push(s.Pop())\n\tfor !s.IsEmpty() {\n\t\tif lessFunc(s.Peek(), t.Peek()) {\n\t\t\tp = s.Pop()\n\t\t\tcount := 0\n\t\t\tfor !t.IsEmpty() && lessFunc(p, t.Peek()) {\n\t\t\t\ts.Push(t.Pop())\n\t\t\t\tcount++\n\t\t\t}\n\t\t\tt.Push(p)\n\t\t\tfor i := 0; i < count; i++ {\n\t\t\t\tt.Push(s.Pop())\n\t\t\t}\n\t\t} else {\n\t\t\tt.Push(s.Pop())\n\t\t}\n\t}\n\tfor !t.IsEmpty() {\n\t\ts.Push(t.Pop())\n\t}\n}", "title": "" }, { "docid": "cdd994329bf9851e2249b4478ae9c44c", "score": "0.55272776", "text": "func (p CommentSlice) Sort() { sort.Sort(p) }", "title": "" }, { "docid": "4737f28319f92586b32f2061a7ebb964", "score": "0.55168176", "text": "func (f *FileList) SortBy(dirsBy DirsBy, filesBy FilesBy) {\n\tf.SetDirsSorter(dirsBy)\n\tf.SetFilesSorter(filesBy)\n\tif dirsBy == nil {\n\t\tf.SetDirsSorter(DefaultDirsBy)\n\t}\n\tif filesBy == nil {\n\t\tf.SetFilesSorter(DefaultFilesBy)\n\t}\n\tf.dirsBy.Sort(f.dirs)\n\n\twg := new(sync.WaitGroup)\n\tnCPU := runtime.NumCPU()\n\tnDirs := len(f.dirs)\n\t// paw.Info.Println(\"nCPU:\", nCPU, \"nDirs:\", nDirs)\n\tfor i := 0; i < nCPU; i++ {\n\t\tfrom := i * nDirs / nCPU\n\t\tto := (i + 1) * nDirs / nCPU\n\t\twg.Add(1)\n\t\t// go sortParts(f, from, to, wg)\n\t\tgo func() {\n\t\t\tdefer wg.Done()\n\t\t\tfor j := from; j < to; j++ {\n\t\t\t\tdir := f.dirs[j]\n\t\t\t\tif len(f.store[dir]) > 1 {\n\t\t\t\t\tif !f.IsGrouped {\n\t\t\t\t\t\tf.filesBy.Sort(f.store[dir][1:])\n\t\t\t\t\t} else {\n\t\t\t\t\t\tsfiles := []*File{}\n\t\t\t\t\t\tsdirs := []*File{}\n\t\t\t\t\t\tfor _, v := range f.store[dir][1:] {\n\t\t\t\t\t\t\tif v.IsDir() {\n\t\t\t\t\t\t\t\tsdirs = append(sdirs, v)\n\t\t\t\t\t\t\t} else {\n\t\t\t\t\t\t\t\tsfiles = append(sfiles, v)\n\t\t\t\t\t\t\t}\n\t\t\t\t\t\t}\n\t\t\t\t\t\tf.filesBy.Sort(sdirs)\n\t\t\t\t\t\tf.filesBy.Sort(sfiles)\n\t\t\t\t\t\tcopy(f.store[dir][1:], sdirs)\n\t\t\t\t\t\tcopy(f.store[dir][len(sdirs)+1:], sfiles)\n\t\t\t\t\t}\n\t\t\t\t}\n\t\t\t}\n\t\t}()\n\t}\n\twg.Wait()\n\treturn\n\t// for _, dir := range f.dirs {\n\t// \tif len(f.store[dir]) > 1 {\n\t// \t\tif !f.IsGrouped {\n\t// \t\t\tf.filesBy.Sort(f.store[dir][1:])\n\t// \t\t} else {\n\t// \t\t\tsfiles := []*File{}\n\t// \t\t\tsdirs := []*File{}\n\t// \t\t\tfor _, v := range f.store[dir][1:] {\n\t// \t\t\t\tif v.IsDir() {\n\t// \t\t\t\t\tsdirs = append(sdirs, v)\n\t// \t\t\t\t} else {\n\t// \t\t\t\t\tsfiles = append(sfiles, v)\n\t// \t\t\t\t}\n\t// \t\t\t}\n\t// \t\t\tf.filesBy.Sort(sdirs)\n\t// \t\t\tf.filesBy.Sort(sfiles)\n\t// \t\t\tcopy(f.store[dir][1:], sdirs)\n\t// \t\t\tcopy(f.store[dir][len(sdirs)+1:], sfiles)\n\t// \t\t}\n\t// \t}\n\t// }\n}", "title": "" }, { "docid": "6954fbfc2eac09c6d1727cf2509e5488", "score": "0.5502795", "text": "func (q *Query) OrderBy(expression string, asc bool) *Query {\n\tq.ordering = append(q.ordering, &order{expression, asc})\n\treturn q\n}", "title": "" }, { "docid": "0bd8214bee9b92957b727ea921e0049d", "score": "0.55012226", "text": "func (s *SelectSorter) Sort(records []*entities.Record) {\n\t// rr := *&s.AbstractSorter\n\t// abc := *&rr\n\t// def := *abc.Comparator\n\t// result := def.Compare(1, 2)\n\t// fmt.Println(result)\n\tcomparator := *(&(*(&(*s).AbstractSorter))).Comparator\n\tfmt.Println(comparator.Compare(1, 2))\n}", "title": "" }, { "docid": "3c39e42721d530afb14f9539c34a4deb", "score": "0.5497119", "text": "func (this SortableKey) SortAlphabetically() *Sorter {\n\treturn &Sorter{key: this.Key, alpha: true}\n}", "title": "" }, { "docid": "3bf013db459b90a5e362363ef1098a57", "score": "0.5481935", "text": "func (ms *multiSorter) Sort(usage []*Process) {\n\tms.usage = usage\n\tsort.Sort(ms)\n}", "title": "" }, { "docid": "6286242214d9dcd9bbcb0f2f1f304d2a", "score": "0.54771435", "text": "func Sort(slice interface{}, less func(i, j int) bool) {\n\tsort.Slice(slice, less)\n}", "title": "" }, { "docid": "db074bdf02d0f68a990b40a1eb06233d", "score": "0.5468165", "text": "func (ss sortbase) Sort(s interface{}, fieldName string) {}", "title": "" }, { "docid": "51bced9132d75bdbcb240e7b6b2e5198", "score": "0.546569", "text": "func (p *PackageList) Sort(criteria string) {\n\tswitch criteria {\n\tcase \"alpha\":\n\t\talphaSort(p)\n\tcase \"score\":\n\t\tscoreSort(p)\n\tcase \"stars\":\n\t\tstarSort(p)\n\tcase \"imports\":\n\t\timportSort(p)\n\t}\n}", "title": "" }, { "docid": "7ada4eb19db5a56b1798c622b618d5ba", "score": "0.54601496", "text": "func (traderFeedbackHistory TraderFeedbackHistory) Sort() TraderFeedbackHistory {\n\tsort.Sort(traderFeedbackHistory)\n\treturn traderFeedbackHistory\n}", "title": "" }, { "docid": "447884b5f40c973bb0a204b865101ee1", "score": "0.5447905", "text": "func Sort(deck []Card, less func(i, j int) bool) {\n\tsort.Slice(deck, less)\n}", "title": "" }, { "docid": "54e727719350a56487e30eeb578733a3", "score": "0.5444862", "text": "func (s HelpAppUpdateClassArray) Sort(less func(a, b HelpAppUpdateClass) bool) HelpAppUpdateClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "9981c468679c800e3b7dafc1c9e0a6d9", "score": "0.54383487", "text": "func (s UserAuthClassArray) Sort(less func(a, b UserAuthClass) bool) UserAuthClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "f26b0ca259b60d8e9774d95645fa328d", "score": "0.5425675", "text": "func (r *aggloSorter) Less(i, j int) bool {\n\treturn r.lambda[r.perm[i]] < r.lambda[r.perm[j]]\n}", "title": "" }, { "docid": "757b54469410dad02fe20a5f3ae673a7", "score": "0.542365", "text": "func (ct *ColTitleComp) switchSortedBy(addmode bool) {\n\tdefer ct.setSortRank()\n\tif addmode {\n\t\tif ct.SortRank < 0 {\n\t\t\tct.SortList = append(ct.SortList, fm.NewSortCol(ct.Title, true))\n\t\t\treturn\n\t\t}\n\t\tct.SortList[ct.SortRank].Asc = !ct.SortList[ct.SortRank].Asc\n\t\treturn\n\t}\n\t// replace mode\n\tif ct.SortRank >= 0 {\n\t\tct.SortList = []*fm.SortCol{fm.NewSortCol(ct.Title, !ct.SortList[ct.SortRank].Asc)}\n\t\treturn\n\t}\n\tct.SortList = []*fm.SortCol{fm.NewSortCol(ct.Title, true)}\n\treturn\n}", "title": "" }, { "docid": "03080c946f5730aa8577f79fd92007f2", "score": "0.54218423", "text": "func (s EmojiListClassArray) Sort(less func(a, b EmojiListClass) bool) EmojiListClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "a38beaa869c6a19aa24745ae390ee929", "score": "0.541346", "text": "func (by By) Sort(records []Record) {\n\trs := &recordSorter{\n\t\trecords: records,\n\t\tby: by,\n\t}\n\tsort.Sort(rs)\n}", "title": "" }, { "docid": "e1af7e4f97ab5f5b4bdbd85a8a5bfa23", "score": "0.5394597", "text": "func (s EncryptedChatWaitingArray) Sort(less func(a, b EncryptedChatWaiting) bool) EncryptedChatWaitingArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "8cf3c566dbf0b9bffda7eb004553423e", "score": "0.5387943", "text": "func (b by) Sort(nodes Nodes) {\n\tps := &nodeSorter{\n\t\tnodes: nodes,\n\t\tby: b, // The Sort method's receiver is the function (closure) that defines the sort order.\n\t}\n\tsort.Sort(ps)\n}", "title": "" }, { "docid": "d813371d44a28d98ea33fa8619edcea8", "score": "0.5387067", "text": "func (p FileInfos) Sort() { sort.Sort(p) }", "title": "" }, { "docid": "61040c227dc25ace0e0edf7df8885a18", "score": "0.53695387", "text": "func (b byName) Less(i, j int) bool {\n\tei, ej := b[i], b[j]\n\n\tpi, pj := ei.Pos, ej.Pos\n\n\tif pi.Filename != pj.Filename {\n\t\treturn pi.Filename < pj.Filename\n\t}\n\tif pi.Line != pj.Line {\n\t\treturn pi.Line < pj.Line\n\t}\n\tif pi.Column != pj.Column {\n\t\treturn pi.Column < pj.Column\n\t}\n\n\treturn ei.Line < ej.Line\n}", "title": "" }, { "docid": "61040c227dc25ace0e0edf7df8885a18", "score": "0.53695387", "text": "func (b byName) Less(i, j int) bool {\n\tei, ej := b[i], b[j]\n\n\tpi, pj := ei.Pos, ej.Pos\n\n\tif pi.Filename != pj.Filename {\n\t\treturn pi.Filename < pj.Filename\n\t}\n\tif pi.Line != pj.Line {\n\t\treturn pi.Line < pj.Line\n\t}\n\tif pi.Column != pj.Column {\n\t\treturn pi.Column < pj.Column\n\t}\n\n\treturn ei.Line < ej.Line\n}", "title": "" }, { "docid": "47cd7ed2f527216a1d0aa6db278e1792", "score": "0.53689265", "text": "func (sorter *modelSorter) Less(i, j int) bool {\n\treturn sorter.lessFunc(sorter.models[i], sorter.models[j])\n}", "title": "" }, { "docid": "e47390342289f26b4676dd2f401c19a9", "score": "0.5367523", "text": "func (c *commentsQueryBuilder) OrderBy(fields ...string) *commentsQueryBuilder {\n\tif c.err != nil {\n\t\treturn c\n\t}\n\tsortFields := make([]query.Sort, len(fields))\n\tfor i, field := range fields {\n\t\tif len(field) == 0 {\n\t\t\tc.err = errors.Wrap(mapping.ErrInvalidModelField, \"cannot set sorting order for an empty field for model: '_Comments'\")\n\t\t\treturn c\n\t\t}\n\t\tvar order query.SortOrder\n\t\tif field[0] == '-' {\n\t\t\torder = query.DescendingOrder\n\t\t\tfield = field[1:]\n\t\t}\n\t\tstructField, ok := NRN_Comments.Model.FieldByName(field)\n\t\tif !ok {\n\t\t\tc.err = errors.Wrapf(mapping.ErrInvalidModelField, \"field: '%s' is not valid for model: '_Comments'\", field)\n\t\t\treturn c\n\t\t}\n\t\tsortFields[i] = query.SortField{StructField: structField, SortOrder: order}\n\t}\n\tc.builder.OrderBy(sortFields...)\n\treturn c\n}", "title": "" }, { "docid": "4e1f03af3f8ed8f0e793babcf3215764", "score": "0.5363391", "text": "func Less(fieldPtr interface{}, value interface{}) Filter {\n\treturn &ComparisonFilter{\n\t\tLeft: fieldPtr,\n\t\tComparison: \"<\",\n\t\tRight: value,\n\t}\n}", "title": "" }, { "docid": "81322124c556d1e3985d4df1200cebbf", "score": "0.53596133", "text": "func (s InputSecureFileClassArray) Sort(less func(a, b InputSecureFileClass) bool) InputSecureFileClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "fd2b0014792890778a31ee0b06b49f00", "score": "0.5347735", "text": "func Sort(data Interface) {\n\t[...]\n}", "title": "" }, { "docid": "47919d19a3667445c084e0204cb72e02", "score": "0.5344444", "text": "func (s URLAuthResultClassArray) Sort(less func(a, b URLAuthResultClass) bool) URLAuthResultClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "9aedaa9da542f7ec01994220603461d8", "score": "0.5336397", "text": "func (hs *QuerySorter) Sort() {\n\tsort.Sort(hs)\n}", "title": "" }, { "docid": "bc59a7d557e08367c933bcadf60acbac", "score": "0.53339446", "text": "func (s HelpPassportConfigClassArray) Sort(less func(a, b HelpPassportConfigClass) bool) HelpPassportConfigClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "d8a48c71ad3603577a4217ed207005ca", "score": "0.53261256", "text": "func (s MessagesFavedStickersClassArray) Sort(less func(a, b MessagesFavedStickersClass) bool) MessagesFavedStickersClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "947c52a187d6300e98ef912b3a0fff6b", "score": "0.5310521", "text": "func (s ChatParticipantClassArray) Sort(less func(a, b ChatParticipantClass) bool) ChatParticipantClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "b1a6875089e523bb3be57e62aa004035", "score": "0.5306506", "text": "func (s EncryptedChatDiscardedArray) Sort(less func(a, b EncryptedChatDiscarded) bool) EncryptedChatDiscardedArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "50ef9107fdebe48a83607f57ccf5de55", "score": "0.52931726", "text": "func (s FileLocationClassArray) Sort(less func(a, b FileLocationClass) bool) FileLocationClassArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "f4983ca5bbd0f835d371aec7a9a4b332", "score": "0.5287678", "text": "func (s EncryptedChatRequestedArray) Sort(less func(a, b EncryptedChatRequested) bool) EncryptedChatRequestedArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "3e19cfaf98ccb778c77adfece7ac20d9", "score": "0.5282792", "text": "func (a ByID) Less(i, j int) bool {\n\treturn a[i].ID < a[j].ID\n}", "title": "" }, { "docid": "ff0c1767ef243cd7df87cb353c88bd45", "score": "0.52816653", "text": "func (s Servers) SortByDistance() {\n\tsort.Sort(byDistance{s})\n}", "title": "" }, { "docid": "0c38abce01a85f1441c266576f93d680", "score": "0.52811944", "text": "func (s URLAuthResultRequestArray) Sort(less func(a, b URLAuthResultRequest) bool) URLAuthResultRequestArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "12ccdef5ed02bfb722392aa37a86dc8b", "score": "0.527678", "text": "func (s *NodeSorter) Less(i, j int) bool {\n\treturn s.by(s.nodes[i], s.nodes[j])\n}", "title": "" }, { "docid": "29d384eda2fa5b608c6da448ca480c4c", "score": "0.52756953", "text": "func (p SliceUI) Sort() { sort.Sort(p) }", "title": "" }, { "docid": "5d072a787413299ee7280397dcf4e5d7", "score": "0.5275419", "text": "func (ms multiSorter) Less(i, j int) bool {\n\tp, q := ms.usage[i], ms.usage[j]\n\t// Try all but the last comparison.\n\tvar k int\n\tfor k = 0; k < len(ms.less)-1; k++ {\n\t\tless := ms.less[k]\n\t\tswitch {\n\t\tcase less(p, q):\n\t\t\t// p < q, so we have a decision.\n\t\t\treturn true\n\t\tcase less(q, p):\n\t\t\t// p > q, so we have a decision.\n\t\t\treturn false\n\t\t}\n\t\t// p == q; try the next comparison.\n\t}\n\t// All comparisons to here said\"equal\", so just return whatever\n\t// the final comparison reports.\n\treturn ms.less[k](p, q)\n}", "title": "" }, { "docid": "d7f9437dc906cc711afa396d41459c4c", "score": "0.5271922", "text": "func (n *NodeSorter) Sort() []*apiv1.Node {\n\tif len(n.processors) == 0 {\n\t\treturn n.nodes\n\t}\n\tsort.Sort(n)\n\treturn n.nodes\n}", "title": "" }, { "docid": "b0131f5d9e46d2457de6552b42ef1913", "score": "0.52716845", "text": "func (c *Commands) Sort() {\n\tsort.Slice(c.list, func(i, j int) bool {\n\t\treturn c.list[i].Name < c.list[j].Name\n\t})\n}", "title": "" }, { "docid": "3ede0852a75e3b041c0c05b7502b5b03", "score": "0.52684736", "text": "func (b *Bitmaps) SortByWidth() {\n\tbyW := (*byWidth)(b)\n\tsort.Sort(byW)\n}", "title": "" }, { "docid": "c947bfbfc0a21dbe0ca59c55447d62c0", "score": "0.5262797", "text": "func (p Page) Less(i, j int) bool {\n\treturn p[i].Order < p[j].Order\n}", "title": "" }, { "docid": "f4c759428a6780844e24e9afb75d96eb", "score": "0.5258649", "text": "func SortMain() {\n\tsortStructPersonByAge()\n\tsortPersonByName()\n}", "title": "" }, { "docid": "84d08f93e3bf8bce2a34f1e1686099ab", "score": "0.5257801", "text": "func (s *nodeSorter) Less(i, j int) bool {\n\treturn s.by(s.nodes[i], s.nodes[j])\n}", "title": "" }, { "docid": "1d38853997c9f9bc7ce08f22b0d052b5", "score": "0.5251956", "text": "func (o openList) Less(i, j int) bool {\n\ta, b := o[i], o[j]\n\tif a.f == b.f {\n\t\treturn a.g > b.g\n\t}\n\treturn a.f < b.f\n}", "title": "" }, { "docid": "e9018cb71faaefcac066240ec2a18db6", "score": "0.524967", "text": "func (s *GoSort) GoSort() {\n sort.Sort(s)\n}", "title": "" }, { "docid": "315aba3c6faadcbc77f2ebafd0277863", "score": "0.52474517", "text": "func (d *Demo) Sort(g *gom.Gom, sortBy string) {\n\ttoolkit.Println(toolkit.Sprintf(\"===== Sort %s =====\", strings.ToUpper(sortBy)))\n\tres := []models.Hero{}\n\n\tvar err error\n\tif d.useParams {\n\t\t_, err = g.Set(&gom.SetParams{\n\t\t\tTableName: \"hero\",\n\t\t\tResult: &res,\n\t\t\tSortField: \"RealName\",\n\t\t\tSortBy: sortBy,\n\t\t\tTimeout: 10,\n\t\t}).Cmd().Get()\n\t} else {\n\t\t_, err = g.Set(nil).Table(\"hero\").Timeout(10).Result(&res).Sort(\"RealName\", sortBy).Cmd().Get()\n\t}\n\n\tif err != nil {\n\t\ttoolkit.Println(err.Error())\n\t}\n\n\tfor _, h := range res {\n\t\ttoolkit.Println(h.RealName, \"=>\", h.Name, \"=>\", h.Age)\n\t}\n}", "title": "" }, { "docid": "e681870eb68263d958438b1b2adbb5ee", "score": "0.5240617", "text": "func (this SortableStringArray) Less(i, j int) bool {\n\treturn this[i] < this[j]\n}", "title": "" }, { "docid": "af4fa168a96146b21eccfc0b72f9d0ab", "score": "0.523815", "text": "func (g Group) Sort() Group {\n\tsort.Strings(g.str)\n\treturn g\n}", "title": "" }, { "docid": "eeefdd005f34060530a1e3a385a859ef", "score": "0.52375454", "text": "func (f *Functions) SortBy(arr interface{}, keyMacro string) (interface{}, error) {\n\tv := reflect.ValueOf(arr)\n\tc := v.Len()\n\n\telems := make(sortElemList, c)\n\tfor i := 0; i < c; i++ {\n\t\te := v.Index(i).Interface()\n\t\tkey, err := f.Macro(keyMacro, e)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\telems[i] = sortElem{key, i}\n\t}\n\n\tsort.Sort(elems)\n\n\tout := reflect.MakeSlice(v.Type(), c, c)\n\tfor i, e := range elems {\n\t\tout.Index(i).Set(v.Index(e.idx))\n\t}\n\treturn out.Interface(), nil\n}", "title": "" }, { "docid": "24efc264aae1e895c47743785c59754e", "score": "0.5236841", "text": "func (sb *SQLBuilder) OrderBy(operator string, fields ...string) *SQLBuilder {\n\tvar buf strings.Builder\n\n\tbuf.WriteString(\"ORDER BY \")\n\n\tfor k, field := range fields {\n\n\t\tbuf.WriteString(field)\n\n\t\tif k != len(fields)-1 {\n\t\t\tbuf.WriteString(\",\")\n\t\t}\n\t}\n\n\tbuf.WriteString(\" \")\n\tbuf.WriteString(operator)\n\n\tsb._orderBy = buf.String()\n\n\treturn sb\n}", "title": "" }, { "docid": "16071f740ea7584193bc0cab31657e22", "score": "0.523274", "text": "func (s InputSecureFileArray) Sort(less func(a, b InputSecureFile) bool) InputSecureFileArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "2d289dedd242ed00fbc7466d64cf54e1", "score": "0.52315724", "text": "func (el Elements) Sort() {\n\tsort.Sort(el)\n}", "title": "" }, { "docid": "a4de9671fedb9f477548b322b85efb5c", "score": "0.52224547", "text": "func newModelSorter(models []*indexedTestModel, fieldName string) *modelSorter {\n\t// lessFuncs is a map of fieldName to a less function\n\t// that returns true iff m1.field < m2.field\n\tlessFuncs := map[string]lessFunc{\n\t\t\"Int\": func(m1, m2 *indexedTestModel) bool {\n\t\t\tif m1.Int == m2.Int {\n\t\t\t\t// Redis sorts by member if the scores are equal.\n\t\t\t\t// Which means all models have a secondary order: the ID field.\n\t\t\t\treturn m1.ModelID() < m2.ModelID()\n\t\t\t}\n\t\t\treturn m1.Int < m2.Int\n\t\t},\n\t\t\"String\": func(m1, m2 *indexedTestModel) bool {\n\t\t\tif m1.String == m2.String {\n\t\t\t\treturn m1.ModelID() < m2.ModelID()\n\t\t\t}\n\t\t\treturn m1.String < m2.String\n\t\t},\n\t\t\"Bool\": func(m1, m2 *indexedTestModel) bool {\n\t\t\tif m1.Bool == m2.Bool {\n\t\t\t\treturn m1.ModelID() < m2.ModelID()\n\t\t\t}\n\t\t\treturn m1.Bool == false && m2.Bool == true\n\t\t},\n\t}\n\treturn &modelSorter{\n\t\tmodels: models,\n\t\tlessFunc: lessFuncs[fieldName],\n\t}\n}", "title": "" }, { "docid": "852f231792fa253cd64cd9d22de9f9a1", "score": "0.52211636", "text": "func (s ChatParticipantAdminArray) Sort(less func(a, b ChatParticipantAdmin) bool) ChatParticipantAdminArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "3458a2ff0b63fc475848b946bb34d7a3", "score": "0.5216475", "text": "func Sortit() []int {\n\n\treturn sortReference.sortAlgo()\n\n}", "title": "" }, { "docid": "8f56bca4d081ce446d0d0eb965d1c40d", "score": "0.5207512", "text": "func (c MethodsCollection) OrderBy() pOrderBy {\n\treturn pOrderBy{\n\t\tMethod: c.MustGet(\"OrderBy\"),\n\t}\n}", "title": "" }, { "docid": "1818cb978612799ff879c06862a0860d", "score": "0.5207406", "text": "func (s UserAuthArray) Sort(less func(a, b UserAuth) bool) UserAuthArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "31331f1a763bcc44a816bdd8ab4f2c8d", "score": "0.5205739", "text": "func (s *recordSorter) Less(i, j int) bool {\n\treturn s.by(&s.records[i], &s.records[j])\n}", "title": "" }, { "docid": "6a1848d91ebe3294a591b8cabde12a26", "score": "0.5202047", "text": "func (s *eventSorter) Less(i, j int) bool {\n\treturn s.by(s.events[i], s.events[j])\n}", "title": "" }, { "docid": "66f2814db7f7b3b60b627e4a0dcb7bcd", "score": "0.5195934", "text": "func (c *StoreCandidates) Sort(less StoreComparer) *StoreCandidates {\n\tsort.Slice(c.Stores, func(i, j int) bool { return less(c.Stores[i], c.Stores[j]) < 0 })\n\treturn c\n}", "title": "" }, { "docid": "149da680d7bb5346296aaf14a5c462f6", "score": "0.5195777", "text": "func (as *anagramSorter) Less(i, j int) bool {\n\tp, q := as.anagrams[i], as.anagrams[j]\n\tvar k int\n\tfor k = 0; k < len(as.less)-1; k++ {\n\t\tless := as.less[k]\n\t\tswitch {\n\t\tcase less(p, q):\n\t\t\treturn true\n\t\tcase less(q, p):\n\t\t\treturn false\n\t\t}\n\t}\n\treturn as.less[k](p, q)\n}", "title": "" }, { "docid": "65087f253760bfcb9b52a37799daaaf8", "score": "0.51858103", "text": "func (s EmojiListArray) Sort(less func(a, b EmojiList) bool) EmojiListArray {\n\tsort.Slice(s, func(i, j int) bool {\n\t\treturn less(s[i], s[j])\n\t})\n\treturn s\n}", "title": "" }, { "docid": "537f25ab0835b02ed341014f8a618f74", "score": "0.51771414", "text": "func Sort(fields ...Direction) Parameter {\n\treturn func(pa Parameterizable) {\n\t\tsort := []map[string]string{}\n\t\tfor _, field := range fields {\n\t\t\tsort = append(sort, map[string]string{\n\t\t\t\tfield.Field(): field.Direction(),\n\t\t\t})\n\t\t}\n\t\tpa.SetParameter(\"sort\", sort)\n\t}\n}", "title": "" }, { "docid": "92bb1a1ffb5642e190447aa270794a56", "score": "0.5173655", "text": "func (o *orderer) Less(i, j int) bool {\n\treturn o.keys[i].Less(o.keys[j])\n}", "title": "" } ]
8349ba7bb062dfba13e72aa9d40b945e
CreateAttestationNote creates an attestation note from AttestationAuthority
[ { "docid": "b4a15f320b274e6fb37cb752d1b3fc50", "score": "0.8336177", "text": "func (c Client) CreateAttestationNote(aa *kritisv1beta1.AttestationAuthority) (*grafeas.Note, error) {\n\taaNote := &attestation.Authority{\n\t\tHint: &attestation.Authority_Hint{\n\t\t\tHumanReadableName: aa.Name,\n\t\t},\n\t}\n\tnote := grafeas.Note{\n\t\tName: fmt.Sprintf(\"projects/%s/notes/%s\", DefaultProject, aa.Name),\n\t\tShortDescription: fmt.Sprintf(\"Image Policy Security Attestor\"),\n\t\tLongDescription: fmt.Sprintf(\"Image Policy Security Attestor deployed in %s namespace\", aa.Namespace),\n\t\tType: &grafeas.Note_AttestationAuthority{\n\t\t\tAttestationAuthority: aaNote,\n\t\t},\n\t}\n\n\treq := &grafeas.CreateNoteRequest{\n\t\tNote: &note,\n\t\tNoteId: aa.Name,\n\t\tParent: fmt.Sprintf(\"projects/%s\", DefaultProject),\n\t}\n\treturn c.client.CreateNote(c.ctx, req)\n}", "title": "" } ]
[ { "docid": "e1ce9bdfc5a99925f36ef3af016193e9", "score": "0.7018076", "text": "func (c Client) AttestationNote(aa *kritisv1beta1.AttestationAuthority) (*grafeas.Note, error) {\n\treq := &grafeas.GetNoteRequest{\n\t\tName: fmt.Sprintf(\"projects/%s/notes/%s\", DefaultProject, aa.Name),\n\t}\n\treturn c.client.GetNote(c.ctx, req)\n}", "title": "" }, { "docid": "e515f43d45fe0323f9d9f8eeeff87655", "score": "0.6547521", "text": "func (s *Store) CreateAccessibilityRequestNote(ctx context.Context, note *models.AccessibilityRequestNote) (*models.AccessibilityRequestNote, error) {\n\tnote.ID = uuid.New()\n\tnow := time.Now()\n\tnote.CreatedAt = &now\n\n\tconst createAccessibilityRequestNoteSQL = `\n\t\t\tINSERT INTO accessibility_request_notes (\n\t\t\t\tid,\n\t\t\t\trequest_id,\n\t\t\t\tcreated_at,\n\t\t\t\tnote,\n\t\t\t eua_user_id\n\t\t\t)\n\t\t\tVALUES (\n\t\t\t\t:id,\n\t\t\t\t:request_id,\n\t\t\t\t:created_at,\n\t\t\t\t:note,\n\t\t\t\t:eua_user_id\n\t\t\t)`\n\t_, err := s.db.NamedExec(\n\t\tcreateAccessibilityRequestNoteSQL,\n\t\tnote,\n\t)\n\tif err != nil {\n\t\tappcontext.ZLogger(ctx).Error(\"Failed to create accessibility request note\", zap.Error(err))\n\t\treturn nil, err\n\t}\n\treturn s.FetchAccessibilityRequestNoteByID(ctx, note.ID)\n}", "title": "" }, { "docid": "d4a78b4c479da4f494eca0cdf5205e70", "score": "0.60956323", "text": "func (s *pgpSigner) CreateAttestation(payload []byte) (*Attestation, error) {\n\t// Create a buffer to store the signature\n\tarmoredSignature := bytes.Buffer{}\n\n\t// Armor-encode the signature before writing to the buffer\n\tarmorWriter, err := armor.Encode(&armoredSignature, openpgp.SignatureType, nil)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"error creating armor buffer\")\n\t}\n\n\tsignatureWriter, err := openpgp.Sign(armorWriter, s.privateKey, nil, nil)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"error signing payload\")\n\t}\n\n\t_, err = signatureWriter.Write(payload)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"error writing payload to armor writer\")\n\t}\n\n\t// The payload is not signed until the armor writer is closed. This will\n\t// call Signature.Sign to sign the payload.\n\tsignatureWriter.Close()\n\t// The CRC checksum is not written until the armor buffer is closed.\n\tarmorWriter.Close()\n\treturn &Attestation{\n\t\tPublicKeyID: s.publicKeyID,\n\t\tSignature: armoredSignature.Bytes(),\n\t}, nil\n}", "title": "" }, { "docid": "162692f72a7b8ef3dfc33df4afc5a8e4", "score": "0.60032326", "text": "func (t *NoteTracer) Create(ctx context.Context, param *sacloud.NoteCreateRequest) (*sacloud.Note, error) {\n\tvar span trace.Span\n\toptions := append(t.config.SpanStartOptions, trace.WithAttributes(\n\t\tattribute.String(\"libsacloud.api.arguments.param\", forceString(param)),\n\t))\n\tctx, span = t.config.Tracer.Start(ctx, \"NoteAPI.Create\", options...)\n\tdefer func() {\n\t\tspan.End()\n\t}()\n\n\t// for http trace\n\tctx = httptrace.WithClientTrace(ctx, otelhttptrace.NewClientTrace(ctx))\n\tresultNote, err := t.Internal.Create(ctx, param)\n\n\tif err != nil {\n\t\tspan.SetStatus(codes.Error, err.Error())\n\t} else {\n\t\tspan.SetStatus(codes.Ok, \"\")\n\t\tspan.SetAttributes(attribute.String(\"libsacloud.api.results.resultNote\", forceString(resultNote)))\n\n\t}\n\treturn resultNote, err\n}", "title": "" }, { "docid": "720a1e6f7438410bd374dde91e7eb666", "score": "0.58209234", "text": "func (c Client) CreateAttestationOccurence(note *grafeas.Note,\n\tcontainerImage string,\n\tpgpSigningKey *secrets.PGPSigningSecret) (*grafeas.Occurrence, error) {\n\tfingerprint, err := util.GetAttestationKeyFingerprint(pgpSigningKey)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Can't get fingerprint from PGP siging key %s: %v\", pgpSigningKey.SecretName, err)\n\t}\n\n\t// Create Attestation Signature\n\tsig, err := util.CreateAttestationSignature(containerImage, pgpSigningKey)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tpgpSignedAttestation := &attestation.PgpSignedAttestation{\n\t\tSignature: sig,\n\t\tKeyId: &attestation.PgpSignedAttestation_PgpKeyId{\n\t\t\tPgpKeyId: fingerprint,\n\t\t},\n\t\tContentType: attestation.PgpSignedAttestation_SIMPLE_SIGNING_JSON,\n\t}\n\n\tattestationDetails := &grafeas.Occurrence_Attestation{\n\t\tAttestation: &attestation.Details{\n\t\t\tAttestation: &attestation.Attestation{\n\t\t\t\tSignature: &attestation.Attestation_PgpSignedAttestation{\n\t\t\t\t\tPgpSignedAttestation: pgpSignedAttestation,\n\t\t\t\t}},\n\t\t},\n\t}\n\tocc := &grafeas.Occurrence{\n\t\tResource: util.GetResource(containerImage),\n\t\tNoteName: note.GetName(),\n\t\tDetails: attestationDetails,\n\t}\n\t// Create the AttestationAuthority Occurrence in the Project AttestationAuthority Note.\n\treq := &grafeas.CreateOccurrenceRequest{\n\t\tOccurrence: occ,\n\t\tParent: fmt.Sprintf(\"projects/%s\", DefaultProject),\n\t}\n\treturn c.client.CreateOccurrence(c.ctx, req)\n}", "title": "" }, { "docid": "3ccc00fdff5a274911cc5eb87cd0a13a", "score": "0.5743116", "text": "func CreateNote(c *gin.Context) {\r\n\tvar note arvindb.Note\r\n\tif err := c.BindJSON(&note); err != nil {\r\n\t\tfmt.Println(err)\r\n\t\treturn\r\n\t}\r\n\r\n\tif err := arvindb.CreateNote(note); err != nil {\r\n\t\tc.JSON(http.StatusOK, gin.H{\r\n\t\t\t\"status\": http.StatusOK,\r\n\t\t\t\"success\": false,\r\n\t\t\t\"message\": err.Error(),\r\n\t\t})\r\n\t\treturn\r\n\t}\r\n\r\n\tc.JSON(http.StatusOK, gin.H{\r\n\t\t\"status\": http.StatusOK,\r\n\t\t\"success\": true,\r\n\t\t\"message\": \"Note successfully created!\",\r\n\t})\r\n}", "title": "" }, { "docid": "820ab8f08d77c6e193628f88051989eb", "score": "0.5671802", "text": "func (c *FakeAttestationAuthorities) Create(ctx context.Context, attestationAuthority *v1beta1.AttestationAuthority, opts v1.CreateOptions) (result *v1beta1.AttestationAuthority, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewCreateAction(attestationauthoritiesResource, c.ns, attestationAuthority), &v1beta1.AttestationAuthority{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*v1beta1.AttestationAuthority), err\n}", "title": "" }, { "docid": "e8e37692355d8d9b7b2c53f9fbb9f1ca", "score": "0.56688195", "text": "func createNote(w http.ResponseWriter, r *http.Request, ps httprouter.Params) {\n\tpayload, _ := ioutil.ReadAll(r.Body)\n\tnote := app.Note{}\n\tjson.Unmarshal(payload, &note)\n\tnote, err := db.create(note)\n\tif err != nil {\n\t\tfmt.Fprintf(w, err.Error())\n\t}\n\tnoteJSON, err := note.ToJSON()\n\tif err != nil {\n\t\tfmt.Fprintf(w, err.Error())\n\t}\n\tfmt.Fprintf(w, noteJSON)\n}", "title": "" }, { "docid": "71f85e4594781f8d635adf76ac2fbac1", "score": "0.5589727", "text": "func (c *Client) CreateNote(ctx context.Context, req *containeranalysispb.CreateNoteRequest, opts ...gax.CallOption) (*containeranalysispb.Note, error) {\n\tctx = insertMetadata(ctx, c.xGoogMetadata)\n\topts = append(c.CallOptions.CreateNote[0:len(c.CallOptions.CreateNote):len(c.CallOptions.CreateNote)], opts...)\n\tvar resp *containeranalysispb.Note\n\terr := gax.Invoke(ctx, func(ctx context.Context, settings gax.CallSettings) error {\n\t\tvar err error\n\t\tresp, err = c.client.CreateNote(ctx, req, settings.GRPC...)\n\t\treturn err\n\t}, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp, nil\n}", "title": "" }, { "docid": "792138e49650d5e8fb3598f09f6eedf9", "score": "0.553539", "text": "func (nt *NoteModel) CreateNote() error {\n\tif nt.ProjectID == 0 {\n\t\treturn errors.New(fmt.Sprint(\"Invalid ProjectID \", nt))\n\t}\n\terr := Queries.CreateNote(nt)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "7169dae80b562eae9ca103759a3a1d94", "score": "0.55267626", "text": "func createNote(w http.ResponseWriter, r *http.Request) {\n\tparams := mux.Vars(r)\n\n\t//Recieve data from web app\n\tvar note Note\n\t_ = json.NewDecoder(r.Body).Decode(&note)\n\n\t//Make database connection\n\tdb := opendb()\n\tdefer db.Close()\n\n\t//Create and execute SQL statement\n\tsqlStatement := `INSERT INTO note (note_text, author_id) SELECT $1 AS note_text, user_id FROM \"user\" WHERE cookie_id = $2`\n\t_, err := db.Exec(sqlStatement, note.NoteText, getCookie(r))\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t//Check if author wants to use their saved sharing settings\n\tif params[\"bool\"] == \"true\" {\n\t\tvar noteID string\n\n\t\t//Find the ID of the latest Note\n\t\tsqlStatement := `SELECT MAX(note_id) FROM note`\n\t\terr := db.QueryRow(sqlStatement).Scan(&noteID)\n\n\t\t//Create and execute SQL statement\n\t\tsqlStatement = `INSERT INTO permissions SELECT $1 AS note_id, favourite_id, read_permission, write_permission FROM favourites JOIN \"user\" ON favourites.author_id = \"user\".user_id WHERE cookie_id = $2`\n\t\t_, err = db.Exec(sqlStatement, noteID, getCookie(r))\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t}\n}", "title": "" }, { "docid": "d63f5da3066bfc4f4c57091f21e36704", "score": "0.5473286", "text": "func NewAuthoredNote()(*AuthoredNote) {\n m := &AuthoredNote{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "ad7666045091293d9f56f7c742b7b0e8", "score": "0.54467225", "text": "func CreateAttestor(kms, name string) (Attestor, error) {\n\treturn newKMSSigner(kms, name)\n}", "title": "" }, { "docid": "12948bb99a40ec7db2a2b95604e80c81", "score": "0.5429204", "text": "func newNoteTracer(in sacloud.NoteAPI, cnf *config) sacloud.NoteAPI {\n\treturn &NoteTracer{\n\t\tInternal: in,\n\t\tconfig: cnf,\n\t}\n}", "title": "" }, { "docid": "0098782698ec689033d58a47bb236100", "score": "0.5417294", "text": "func (c *MedicalNoteClient) Create() *MedicalNoteCreate {\n\treturn &MedicalNoteCreate{config: c.config}\n}", "title": "" }, { "docid": "7383d360c9ba329c4d5598e51cc32918", "score": "0.540504", "text": "func CreateNote(title, content string) (conv Note, err error) {\n\treturn InnerCreateNote(Db, title, content)\n}", "title": "" }, { "docid": "b28ede49c8f6e62eef43933d60e9aafc", "score": "0.539603", "text": "func (client BaseClient) CreateNoteResponder(resp *http.Response) (result NoteModel, err error) {\n err = autorest.Respond(\n resp,\n client.ByInspecting(),\n azure.WithErrorUnlessStatusCode(http.StatusOK,http.StatusCreated,http.StatusForbidden,http.StatusNotFound),\n autorest.ByUnmarshallingJSON(&result),\n autorest.ByClosing())\n result.Response = autorest.Response{Response: resp}\n return\n }", "title": "" }, { "docid": "a2514d30915bc637bb46b4a19fb591a7", "score": "0.5395619", "text": "func CreateNote(c *Client, note Note) (NoteRecord, error) {\n\tcurrentTimestamp := time.Now()\n\tsqlStatement := `\n\tINSERT INTO note (text, created_timestamp) VALUES ($1, $2)\n\tRETURNING id`\n\n\tid := 0\n\terr := c.DB.QueryRow(sqlStatement, note.Text, currentTimestamp).Scan(&id)\n\tif err != nil {\n\t\tfmt.Printf(\"Failed to insert note: %s\\n\", err)\n\t\treturn NoteRecord{}, err\n\t}\n\n\treturn NoteRecord{\n\t\tid,\n\t\tnote.Text,\n\t\tcurrentTimestamp,\n\t}, nil\n}", "title": "" }, { "docid": "8643f6210f83b8d9d356a5602977df3b", "score": "0.53545696", "text": "func NewNote(content string, index int) *Note {\n\treturn &Note{Content: content, Index: index}\n}", "title": "" }, { "docid": "2e058a725e778c8bad57d8c7757ba290", "score": "0.5353077", "text": "func NewNote(ctx *pulumi.Context,\n\tname string, args *NoteArgs, opts ...pulumi.ResourceOption) (*Note, error) {\n\tif args == nil {\n\t\treturn nil, errors.New(\"missing one or more required arguments\")\n\t}\n\n\tif args.NoteId == nil {\n\t\treturn nil, errors.New(\"invalid value for required argument 'NoteId'\")\n\t}\n\tvar resource Note\n\terr := ctx.RegisterResource(\"google-native:containeranalysis/v1beta1:Note\", name, args, &resource, opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &resource, nil\n}", "title": "" }, { "docid": "d7a921d07a52c6510918d731cc658783", "score": "0.5301881", "text": "func (p *NoteStoreClient) CreateNote(authenticationToken string, note *Types.Note) (r *Types.Note, userException *Errors.EDAMUserException, systemException *Errors.EDAMSystemException, notFoundException *Errors.EDAMNotFoundException, err error) {\n\tif err = p.sendCreateNote(authenticationToken, note); err != nil {\n\t\treturn\n\t}\n\treturn p.recvCreateNote()\n}", "title": "" }, { "docid": "b4139d61d8f3f7f1c73440a9af706813", "score": "0.5295407", "text": "func (es *ElasticsearchStorage) CreateNote(ctx context.Context, projectId, noteId, uID string, n *pb.Note) (*pb.Note, error) {\n\tnoteName := fmt.Sprintf(\"projects/%s/notes/%s\", projectId, noteId)\n\tlog := es.logger.Named(\"CreateNote\").With(zap.String(\"note\", noteName))\n\n\t// since note IDs are provided up front by the client, we need to search ES to see if this note already exists before creating it\n\tsearch := &esSearch{\n\t\tQuery: &filtering.Query{\n\t\t\tTerm: &filtering.Term{\n\t\t\t\t\"name\": noteName,\n\t\t\t},\n\t\t},\n\t}\n\terr := es.genericGet(ctx, log, search, notesIndex(projectId), &pb.Note{})\n\tif err == nil { // note exists\n\t\tlog.Debug(\"note already exists\")\n\t\treturn nil, status.Error(codes.AlreadyExists, fmt.Sprintf(\"note with name %s already exists\", noteName))\n\t} else if status.Code(err) != codes.NotFound { // unexpected error (we expect a not found error here)\n\t\treturn nil, err\n\t}\n\n\tif n.CreateTime == nil {\n\t\tn.CreateTime = ptypes.TimestampNow()\n\t}\n\tn.Name = noteName\n\n\terr = es.genericCreate(ctx, log, notesIndex(projectId), n)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn n, nil\n}", "title": "" }, { "docid": "8eff0ab9dfccbf3d487340477f873d33", "score": "0.5280916", "text": "func NewNote() *Note {\n\treturn &Note{\n\t\tCreatedTime: time.Now(),\n\t}\n}", "title": "" }, { "docid": "34b5037385c46fe3b445c9aa3cc98dd6", "score": "0.5278999", "text": "func (r *articleResolver) CreateAt(ctx context.Context, obj *model.Article) (*time.Time, error) {\n\tpanic(fmt.Errorf(\"not implemented: CreateAt - createAt\"))\n}", "title": "" }, { "docid": "426a0cff4e8b5e42af1797afdc40d401", "score": "0.5246977", "text": "func (s *NotesService) Create(ctx context.Context, opt *NoteCreateOptions) (*NoteResponse, *Response, error) {\n\treq, err := s.client.NewRequest(http.MethodPost, \"/notes\", nil, opt)\n\n\tif err != nil {\n\t\treturn nil, nil, err\n\t}\n\n\tvar record *NoteResponse\n\n\tresp, err := s.client.Do(ctx, req, &record)\n\n\tif err != nil {\n\t\treturn nil, resp, err\n\t}\n\n\treturn record, resp, nil\n}", "title": "" }, { "docid": "c48e1b4fd7fcc84484b30ee2b99ad02a", "score": "0.52303743", "text": "func createNote(node *Node, leftOrRight, msg string) Note {\n\tside := Left\n\tif leftOrRight == \"right\" {\n\t\tside = Right\n\t}\n\treturn Note{node, side, simpleMessage{msg}}\n}", "title": "" }, { "docid": "6c8c96c288c175106cc1677c8c6c94b1", "score": "0.5184125", "text": "func (client BaseClient) CreateNoteSender(req *http.Request) (*http.Response, error) {\n return autorest.SendWithSender(client, req,\n autorest.DoRetryForStatusCodes(client.RetryAttempts, client.RetryDuration, autorest.StatusCodesForRetry...))\n }", "title": "" }, { "docid": "52a69f5ccee98667ff104295b37b0c71", "score": "0.5174917", "text": "func (eng *EvernoteNoteGraph) CreateNote(evernoteNote *edam.Note) (*Note, error) {\n\tlogrus.Debugf(\"Creating Note representation of Evernote note with GUID [%s] and title [%s]\", evernoteNote.GetGUID(), evernoteNote.GetTitle())\n\n\tnoteGUID := string(evernoteNote.GetGUID())\n\tnoteTitle := evernoteNote.GetTitle()\n\tnoteURL, noteURLType, err := eng.CreateNoteURL(noteGUID)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"Failed to create Note URL for Evernote note with GUID [%s] and title [%s]: %w\", evernoteNote.GetGUID(), evernoteNote.GetTitle(), err)\n\t}\n\n\treturn &Note{GUID: noteGUID, Title: noteTitle, Description: noteTitle, URL: *noteURL, URLType: *noteURLType}, nil\n}", "title": "" }, { "docid": "821202190d45e6c0d7aa4a6f4b4743e4", "score": "0.5165374", "text": "func NewNote(c *gin.Context) {\n\tuser := c.MustGet(\"user\").(models.User)\n\n\t// Get request variables\n\tvar requestVars NoteRequest\n\tif err := c.BindJSON(&requestVars); err != nil {\n\t\terrors.JSON.Apply(c)\n\t\treturn\n\t}\n\n\t// Verify request validity\n\tif err, ok := verifyNoteRequest(requestVars); !ok {\n\t\terr.Apply(c)\n\t\treturn\n\t}\n\n\t// Get request tags\n\ttags, err := db.GetTags(requestVars.Tags)\n\tif err != nil {\n\t\terrors.DB.Apply(c)\n\t\treturn\n\t}\n\n\t// Create and save note\n\tnewNote := models.Note{\n\t\tTitle: requestVars.Title,\n\t\tBody: requestVars.Body,\n\t\tDescription: requestVars.Description,\n\t\tAuthor: user,\n\t\tPublished: requestVars.Publish,\n\t\tTags: tags,\n\t}\n\tif err := db.DB.Create(&newNote).Error; err != nil {\n\t\terrors.DB.Apply(c)\n\t\treturn\n\t}\n\n\t// Update searchtext field\n\tif err := db.UpdateNoteSearchText(newNote.ID); err != nil {\n\t\terrors.DB.Apply(c)\n\t\treturn\n\t}\n\n\t// Return note in JSON\n\tc.JSON(http.StatusOK, newNote)\n}", "title": "" }, { "docid": "4d1091d6114754bcec49ac46998b5983", "score": "0.511854", "text": "func do_create(note Note) uint64 {\n\tpl(\"Creating new note...\")\n\tperformNoteChange(\n\t\tNoteChange{\n\t\t\tGuid: generate_sha1(), Operation: 1,\n\t\t\tNoteGuid: note.Guid,\n\t\t\tNote: note,\n\t\t\tNoteFragment: NoteFragment{},\n\t\t})\n\n\tif n, err := getNote(note.Guid); err != nil {\n\t\tpf(\"Error creating note %v\\n\", note)\n\t\treturn 0\n\t} else {\n\t\tpf(\"Record saved: [%d] %s\\n\", n.Id, n.Title)\n\t\treturn n.Id\n\t}\n\treturn 0\n}", "title": "" }, { "docid": "08c55f119936b712d5c15002690da4f5", "score": "0.50995034", "text": "func (client BaseClient) CreateNote(ctx context.Context, drawer int32, model InsertNoteRequestModel) (result NoteModel, err error) {\n if err := validation.Validate([]validation.Validation{\n { TargetValue: model,\n Constraints: []validation.Constraint{\t{Target: \"model.EntityID\", Name: validation.Null, Rule: false ,\n Chain: []validation.Constraint{\t{Target: \"model.EntityID\", Name: validation.InclusiveMaximum, Rule: 2147483647, Chain: nil },\n \t{Target: \"model.EntityID\", Name: validation.InclusiveMinimum, Rule: 1, Chain: nil },\n }},\n \t{Target: \"model.Name\", Name: validation.Null, Rule: true ,\n Chain: []validation.Constraint{\t{Target: \"model.Name\", Name: validation.MaxLength, Rule: 255, Chain: nil },\n \t{Target: \"model.Name\", Name: validation.MinLength, Rule: 0, Chain: nil },\n }},\n \t{Target: \"model.Note\", Name: validation.Null, Rule: true ,\n Chain: []validation.Constraint{\t{Target: \"model.Note\", Name: validation.MaxLength, Rule: 8000, Chain: nil },\n \t{Target: \"model.Note\", Name: validation.MinLength, Rule: 0, Chain: nil },\n }},\n \t{Target: \"model.ParentID\", Name: validation.Null, Rule: false ,\n Chain: []validation.Constraint{\t{Target: \"model.ParentID\", Name: validation.InclusiveMaximum, Rule: 2147483647, Chain: nil },\n \t{Target: \"model.ParentID\", Name: validation.InclusiveMinimum, Rule: 0, Chain: nil },\n }}}}}); err != nil {\n return result, validation.NewErrorWithValidationError(err, \"softheonenterpriseapiclient.BaseClient\",\"CreateNote\")\n }\n\n req, err := client.CreateNotePreparer(ctx, drawer, model)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"softheonenterpriseapiclient.BaseClient\", \"CreateNote\", nil , \"Failure preparing request\")\n return\n }\n\n resp, err := client.CreateNoteSender(req)\n if err != nil {\n result.Response = autorest.Response{Response: resp}\n err = autorest.NewErrorWithError(err, \"softheonenterpriseapiclient.BaseClient\", \"CreateNote\", resp, \"Failure sending request\")\n return\n }\n\n result, err = client.CreateNoteResponder(resp)\n if err != nil {\n err = autorest.NewErrorWithError(err, \"softheonenterpriseapiclient.BaseClient\", \"CreateNote\", resp, \"Failure responding to request\")\n }\n\n return\n }", "title": "" }, { "docid": "c459e66c2837f0228432b7d364cb04f3", "score": "0.50590414", "text": "func CreateAnnouncement(c echo.Context) error {\n\tuserid := authController.FetchLoggedInUserID(c)\n\n\ttitle := c.FormValue(\"title\")\n\ttopic := c.FormValue(\"topic\")\n\tcontent := c.FormValue(\"content\")\n\tclass := c.FormValue(\"selectedClass\")\n\n\tannouncement := anouncementsModel.Announcement{\n\t\tUserID: userid,\n\t\tTitle: title,\n\t\tTopic: topic,\n\t\tContent: content,\n\t\tClassHash: class,\n\t}\n\n\terr := announcementsDBInteractions.CreateAnnouncement(&announcement)\n\tif err != nil {\n\t\treturn c.JSON(http.StatusInternalServerError, echo.Map{\n\t\t\t\"message\": \"Unexpected error occurred (announcement not created), please try again\",\n\t\t})\n\t}\n\treturn c.JSON(http.StatusOK, echo.Map{\n\t\t\"message\": \"Announcement created successfully\",\n\t\t\"announcement\": announcement,\n\t})\n}", "title": "" }, { "docid": "59348e7b0eefe1dc42ea5689ca14bb01", "score": "0.5058264", "text": "func (query *dbStore) CreateNote(nt *NoteModel) error {\n\tvar ID int\n\tdata, err := query.db.Query(`INSERT INTO notes(titulo, detalle, fecha, project_id) VALUES ($1,$2,$3,$4);`, nt.Titulo, nt.Detalle, nt.Fecha, nt.ProjectID)\n\tdefer data.Close()\n\trows, err := query.db.Query(\"SELECT note_id FROM notes WHERE titulo=$1 AND project_id = $2\", nt.Titulo, nt.ProjectID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tdefer rows.Close()\n\tfor rows.Next() {\n\t\tif err := rows.Scan(&ID); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\tnt.ID = ID\n\treturn nil\n}", "title": "" }, { "docid": "9aebd5438020eb3e871b9953e6e6b4d5", "score": "0.50531584", "text": "func setNote(ctx context.Context, user string, note rpc.SetNoteRequest, in machine.Description) machine.Description {\n\tret := in.Copy()\n\n\tret.Note = machine.Annotation{\n\t\tMessage: note.Message,\n\t\tUser: user,\n\t\tTimestamp: now.Now(ctx),\n\t}\n\treturn ret\n}", "title": "" }, { "docid": "b4706bbb63eb94ce1cba5e83cbbca7ed", "score": "0.5042312", "text": "func NewNote(class string, note string) Note {\n\treturn Note{\n\t\tClass: class,\n\t\tNote: note,\n\t}\n}", "title": "" }, { "docid": "cfa9cdadb19fa8287223116c6a727bb5", "score": "0.5032585", "text": "func NewNote() Note {\n\treturn Note(New())\n}", "title": "" }, { "docid": "fe488584697c3db01dcb29b714c81b7b", "score": "0.5029343", "text": "func (creationRequest *NewNote) TransformToNote() (*Note, error) {\n\tif !creationRequest.IsValid() {\n\t\treturn nil, errors.New(\"article object is not valid\")\n\t}\n\n\t// Hopefully this will come from JWT\n\tuser := &User{\n\t\tID: creationRequest.UserID,\n\t}\n\n\t//fmt.Printf(\"In transform: %+v\\n\", *user)\n\treturn &Note{\n\t\tTitle: creationRequest.Title,\n\t\tText: creationRequest.Text,\n\t\tUser: user,\n\t}, nil\n}", "title": "" }, { "docid": "854c7bb53ed0e68a3387eaf0bc27b772", "score": "0.5013997", "text": "func (c Client) AnnotationCreate(dashboardID, panelID uint64, from, to time.Time, text string, tag ...string) error {\n\tvar tags []string\n\tfor _, t := range tag {\n\t\ttags = append(tags, t)\n\t}\n\tpayload := map[string]interface{}{\n\t\t\"dashboardId\": dashboardID,\n\t\t\"panelId\": panelID,\n\t\t\"time\": timeToEpochMS(from),\n\t\t\"timeEnd\": timeToEpochMS(to),\n\t\t\"text\": text,\n\t\t\"tags\": tags,\n\t}\n\n\tresp, err := c.Post(\"/annotations\", payload)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcode := resp.StatusCode()\n\tif code != 200 {\n\t\treturn fmt.Errorf(\"Unexpected return code: %v\", code)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "3be236ddb47acdc4efadbbb51566e096", "score": "0.49823233", "text": "func CreateIdempotencyEntry(idemCtx context.T, message *contracts.DocumentState) error {\n\tvar err error\n\tcontext := idemCtx.With(\"[\" + Name + \"]\")\n\tlog := context.Log()\n\tdirectoryPath := getIdempotencyDir(context)\n\tcommandID, _ := messageContracts.GetCommandID(message.DocumentInformation.MessageID)\n\tcommandDirPath := filepath.Join(directoryPath, string(message.DocumentType), commandID)\n\tlog.Infof(\"writing command in the idempotency directory for command %v\", commandID)\n\tif err = makeDirs(commandDirPath); err != nil {\n\t\tlog.Warnf(\"could not create command directory in %v for the command %v: err: %v\", commandDirPath, commandID, err)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "b3641dd57f333baf41bf2c4490b7c066", "score": "0.4929916", "text": "func (ns *NoteService) AddNote(classID int, meetingID int, t int, key string, subKey int, body string, session *Session) (int, error) {\n\tif ns.cache == nil {\n\t\treturn 0, common.ERR_NO_SERVICE\n\t}\n\n\tn := ns.newNote(0, classID, meetingID, t, key, subKey, body, session)\n\tif n == nil {\n\t\treturn 0, common.ERR_INVALID_NOTE\n\t}\n\n\tsID := strconv.Itoa(n.ID)\n\tsContent := n.ToJSON()\n\n\tif err := (func() error {\n\t\t// Add it to user-class notes.\n\t\tif err := ns.cache.SetField(ns.getUserClassNoteKeyForCache(n.UserID, n.ClassID), sID, sContent); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\t// Add it to typed notes.\n\t\tif err := ns.cache.SetField(ns.getTypedNoteKeyForCache(n.Type, n.Key), sID, sContent); err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\treturn nil\n\t})(); err != nil {\n\t\treturn 0, err\n\t}\n\n\t// Update database, respectively.\n\tif ns.db != nil {\n\t\t// Put it into the task queue.\n\t\tns.tasks <- &NoteTask{true, n}\n\t}\n\n\treturn n.ID, nil\n}", "title": "" }, { "docid": "eaae04fe5bfa29096b82881c360b6401", "score": "0.49298853", "text": "func (n *Note) Create() error {\n\n\tif n.ContactID == 0 {\n\t\treturn errors.New(\"missing a contact ID\")\n\t}\n\n\treturn DB.Create(&n).Error\n}", "title": "" }, { "docid": "bee47bd93c2cf530a79155229c6c511e", "score": "0.49298626", "text": "func (client BaseClient) CreateNotePreparer(ctx context.Context, drawer int32, model InsertNoteRequestModel) (*http.Request, error) {\n pathParameters := map[string]interface{} {\n \"drawer\": autorest.Encode(\"path\",drawer),\n }\n\n preparer := autorest.CreatePreparer(\n autorest.AsJSON(),\n autorest.AsPost(),\n autorest.WithBaseURL(client.BaseURI),\n autorest.WithPathParameters(\"/v1/content/notes/{drawer}\",pathParameters),\n autorest.WithJSON(model))\n return preparer.Prepare((&http.Request{}).WithContext(ctx))\n }", "title": "" }, { "docid": "2a510f1bdba5282287d7d5a247636efc", "score": "0.4910912", "text": "func (s *Fb2) CreateNote(name string) *Body {\n\tb := &Body{name: name}\n\tif s.notes == nil {\n\t\ts.notes = []*Body{b}\n\t} else {\n\t\ts.notes = append(s.notes, b)\n\t}\n\treturn b\n}", "title": "" }, { "docid": "fdd076962002e761946d575d1b6d650a", "score": "0.49066222", "text": "func (server Server) CreateNewNote(w http.ResponseWriter, r *http.Request) {\n\n\t// return the string response containing the request body\n\tvar note models.Note\n\tvar res models.APIResponse\n\n\terr := json.NewDecoder(r.Body).Decode(&note) //decode sent data\n\tif err != nil { //error check\n\t\tlog.Printf(\"Unable to decode the request body. %v\", err)\n\t\tres = models.BuildAPIResponseFail(\"Invalid Json when creating new note\", nil) // fail response\n\t} else {\n\t\tinsertID := insertNote(note, server.db) // call insert user function and pass the note\n\t\tres = models.BuildAPIResponseSuccess(\"Note created successfully\", insertID) // success response\n\t}\n\tjson.NewEncoder(w).Encode(res) //send response\n\n}", "title": "" }, { "docid": "aaa2808d5764e6c2119cb98a14f8873d", "score": "0.4883282", "text": "func (mw serviceLoggingMiddleware) CreateEstab(ctx context.Context, estab svcdb.Establishment, proID int64) (svcdb.Establishment, error) {\n\tnewEstab, err := mw.next.CreateEstab(ctx, estab, proID)\n\n\tmw.logger.Log(\n\t\t\"method\", \"CreateEstab\",\n\t\t\"request\", estab,\n\t\t\"response\", newEstab,\n\t\t\"took\", time.Since(time.Now()),\n\t)\n\treturn estab, err\n}", "title": "" }, { "docid": "926dc36d9dc8377165c26e40559801de", "score": "0.48666477", "text": "func createTextAnnotation(xRefTable *XRefTable, pageIndRef *PDFIndirectRef, annotRect *PDFArray) (*PDFIndirectRef, error) {\n\n\td := PDFDict{\n\t\tDict: map[string]PDFObject{\n\t\t\t\"Type\": PDFName(\"Annot\"),\n\t\t\t\"Subtype\": PDFName(\"Text\"),\n\t\t\t\"Contents\": PDFStringLiteral(\"Text Annotation\"),\n\t\t\t\"Rect\": *annotRect,\n\t\t\t\"P\": *pageIndRef,\n\t\t\t\"Border\": NewIntegerArray(0, 0, 5),\n\t\t\t\"C\": NewNumberArray(1, 0, 0),\n\t\t\t\"Name\": PDFName(\"Note\"),\n\t\t},\n\t}\n\n\treturn xRefTable.IndRefForNewObject(d)\n}", "title": "" }, { "docid": "2583456b3dd37ada7ed0ae050a893f8d", "score": "0.48481825", "text": "func newNote(w http.ResponseWriter, r *http.Request) {\n\n\t//get current date and format it\n\tcurrentTime := time.Now()\n\tprettyTime := currentTime.Format(\"Mon January _2, 2006\")\n\n\t//add date to top of file and add some newlines for formatting\n\tos.MkdirAll(config.Mycfg.Paths.Notes, 0777)\n\tresponse := note{\n\t\tPath: config.Mycfg.Paths.Notes,\n\t\tFileName: \"\",\n\t\tText: prettyTime + \", \\n\\n\",\n\t}\n\tjs, err := json.Marshal(response)\n\tgenericErrHandler(err)\n\n\tw = setHeaders(w)\n\tw.Write(js)\n}", "title": "" }, { "docid": "fe217278931f6eeed36c84bd87ba4971", "score": "0.48301858", "text": "func (self *EventBuilder) BuildNote(text, date, device string) *intertidal.NoteEvent {\n\treturn &intertidal.NoteEvent{\n\t\tCommon: intertidal.Common{Type: \"note\", Source: SRC_INTERTIDAL, DeviceId: device, Time: date},\n\t\tText: text,\n\t\tCreatorId: device,\n\t}\n}", "title": "" }, { "docid": "6f7e64bf51a001bda4cae12bc08463d3", "score": "0.4809497", "text": "func (t *SimpleChaincode) createAircraft(stub shim.ChaincodeStubInterface, args []string) ([]byte, error) {\n\tvar err error\n\tvar air Aircraft\n\t\tair.AN = args [0] \n\t\tair.SN = args [1] \n\t\tair.Id_Aircraft = args[2] \n\t\tair.AircraftName = args[3]\n\t\tair.Owner = args [4] \n\t\tair.Responsible = args [5] \n\tvar tx LogAircraft\n\t\ttx.Owner \t\t= air.Owner\n\t\ttx.Responsible = air.Responsible\n\t\ttx.VDate \t\t= args[6]\n\t\ttx.LType \t\t= \"CREATION\"\n\t\ttx.Description = args [4] + \" Created This Aircraft\" \n\tair.Logs = append(air.Logs, tx)\n// If the PN or/and the SN is/are already used, a part can't be created.\n\tn:= checkAnAircraft(stub, args[0])\n\t\tif n != nil { return nil, errors.New(n.Error())}\t\n\to:= checkSnAircraft(stub, args[1])\n\t\tif o != nil { return nil, errors.New(o.Error())}\n//Commit part to ledger\n\tptAsBytes, _ := json.Marshal(air)\n\t\terr = stub.PutState(air.Id_Aircraft, ptAsBytes)\n\t\tif err != nil {return nil, err}\t\n//Fin Commit part to ledger\n\ty:= UpdateAircraft (stub, air) \n\t\tif y != nil { return nil, errors.New(y.Error())}\nfmt.Println(\"Responsible created successfully\")\t\nreturn nil, nil\n}", "title": "" }, { "docid": "277364b044e88bd521473d2e51779d7c", "score": "0.47903934", "text": "func CreateAuthoredNoteFromDiscriminatorValue(parseNode i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.ParseNode)(i878a80d2330e89d26896388a3f487eef27b0a0e6c010c493bf80be1452208f91.Parsable, error) {\n return NewAuthoredNote(), nil\n}", "title": "" }, { "docid": "46c6a0122bd5139fe788d7cbed51349b", "score": "0.47833243", "text": "func (e Encrypter) WriteNote(d string) error {\n\t/* If we've no name, write no note. That's mean. */\n\tif \"\" == e.RansomNoteName {\n\t\treturn nil\n\t}\n\n\t/* Make the file to hold the note */\n\tf, err := os.Create(filepath.Join(d, e.RansomNoteName))\n\tif nil != err {\n\t\treturn fmt.Errorf(\"creating file: %w\", err)\n\t}\n\tdefer f.Close()\n\t/* Write the note to it */\n\tif _, err := f.Write(FilledNoteTemplate); nil != err {\n\t\treturn fmt.Errorf(\"writing note: %w\", err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "50166ad110195d123033a70f9ea034b4", "score": "0.47578284", "text": "func (t *StackedHost) Attest(childSubprin auth.SubPrin, issuer *auth.Prin,\n\ttime, expiration *int64, message auth.Form) (*Attestation, error) {\n\n\tchild := t.taoHostName.MakeSubprincipal(childSubprin)\n\tif issuer != nil {\n\t\tif !auth.SubprinOrIdentical(*issuer, child) {\n\t\t\treturn nil, newError(\"invalid issuer in statement\")\n\t\t}\n\t} else {\n\t\tissuer = &child\n\t}\n\n\tif t.keys == nil || t.keys.SigningKey == nil {\n\t\treturn t.hostTao.Attest(issuer, time, expiration, message)\n\t}\n\n\tstmt := auth.Says{Speaker: *issuer, Time: time, Expiration: expiration, Message: message}\n\n\tvar d []byte\n\tif t.keys.Delegation != nil {\n\t\tvar err error\n\t\td, err = proto.Marshal(t.keys.Delegation)\n\t\tif err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t}\n\n\treturn GenerateAttestation(t.keys.SigningKey, d, stmt)\n}", "title": "" }, { "docid": "52058293cfd3c78a92c7288ef0332986", "score": "0.47503167", "text": "func CreateDescribeNoteRequest() (request *DescribeNoteRequest) {\n\trequest = &DescribeNoteRequest{\n\t\tRpcRequest: &requests.RpcRequest{},\n\t}\n\trequest.InitWithApiInfo(\"Emr\", \"2016-04-08\", \"DescribeNote\", \"emr\", \"openAPI\")\n\treturn\n}", "title": "" }, { "docid": "8b0bef282c3a64e7b7ec1d4ee1617a9d", "score": "0.4725961", "text": "func (mr *MockNoteServiceMockRecorder) CreateNote(req interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"CreateNote\", reflect.TypeOf((*MockNoteService)(nil).CreateNote), req)\n}", "title": "" }, { "docid": "bb17b798f346b98569e661f5755f0271", "score": "0.47176614", "text": "func DecodeAttestationData(in []byte) (*AttestationData, error) {\n\tbuf := bytes.NewBuffer(in)\n\n\tvar ad AttestationData\n\tif err := tpmutil.UnpackBuf(buf, &ad.Magic, &ad.Type); err != nil {\n\t\treturn nil, fmt.Errorf(\"decoding Magic/Type: %v\", err)\n\t}\n\t// All attestation structures have the magic prefix\n\t// TPMS_GENERATED_VALUE to symbolize they were created by\n\t// the TPM when signed with an AK.\n\tif ad.Magic != 0xff544347 {\n\t\treturn nil, fmt.Errorf(\"incorrect magic value: %x\", ad.Magic)\n\t}\n\n\tn, err := DecodeName(buf)\n\tif err != nil {\n\t\treturn nil, fmt.Errorf(\"decoding QualifiedSigner: %v\", err)\n\t}\n\tad.QualifiedSigner = *n\n\tif err := tpmutil.UnpackBuf(buf, &ad.ExtraData, &ad.ClockInfo, &ad.FirmwareVersion); err != nil {\n\t\treturn nil, fmt.Errorf(\"decoding ExtraData/ClockInfo/FirmwareVersion: %v\", err)\n\t}\n\n\t// The spec specifies several other types of attestation data. We only need\n\t// parsing of Certify & Creation attestation data for now. If you need\n\t// support for other attestation types, add them here.\n\tswitch ad.Type {\n\tcase TagAttestCertify:\n\t\tif ad.AttestedCertifyInfo, err = decodeCertifyInfo(buf); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"decoding AttestedCertifyInfo: %v\", err)\n\t\t}\n\tcase TagAttestCreation:\n\t\tif ad.AttestedCreationInfo, err = decodeCreationInfo(buf); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"decoding AttestedCreationInfo: %v\", err)\n\t\t}\n\tcase TagAttestQuote:\n\t\tif ad.AttestedQuoteInfo, err = decodeQuoteInfo(buf); err != nil {\n\t\t\treturn nil, fmt.Errorf(\"decoding AttestedQuoteInfo: %v\", err)\n\t\t}\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"only Quote, Certify & Creation attestation structures are supported, got type 0x%x\", ad.Type)\n\t}\n\n\treturn &ad, nil\n}", "title": "" }, { "docid": "9907354792ac931c8027ba35c7d1fe5f", "score": "0.4666268", "text": "func (r ApiGetApplianceReleaseNoteListRequest) At(at string) ApiGetApplianceReleaseNoteListRequest {\n\tr.at = &at\n\treturn r\n}", "title": "" }, { "docid": "8860365a40ff475fbedd4fd758ee6394", "score": "0.4665788", "text": "func (s *Service) CreationWithdrawArticle(c context.Context, arg *model.ArgAidMid) (err error) {\n\terr = s.client.Call(c, _creationWithdrawArticle, arg, _noReply)\n\treturn\n}", "title": "" }, { "docid": "2a9b9346b3283a10e4d54e874bb51b37", "score": "0.46620306", "text": "func (a *IamOrganisationPolicyApiService) IamOrganisationPolicyActorCreate(ctx context.Context, organisationId string, policyId string) ApiIamOrganisationPolicyActorCreateRequest {\n\treturn ApiIamOrganisationPolicyActorCreateRequest{\n\t\tApiService: a,\n\t\tctx: ctx,\n\t\torganisationId: organisationId,\n\t\tpolicyId: policyId,\n\t}\n}", "title": "" }, { "docid": "05fd4620cf54edf0418c763b7c5b39c7", "score": "0.46378732", "text": "func NewNote(channel, key, velocity uint8, state NoteState) Note {\n\treturn Note{\n\t\tChannel: channel,\n\t\tKey: key,\n\t\tVelocity: velocity,\n\t\tTime: time.Now().UnixNano() / 1000,\n\t\tState: state,\n\t}\n}", "title": "" }, { "docid": "bcc99fba92364c62b070f30966e937b5", "score": "0.46345332", "text": "func (server *Server) CreateAssunto(w http.ResponseWriter, r *http.Request) {\n\n\t//\tAutorizacao de Modulo\n\tif err := config.AuthMod(w, r, 19001); err != nil {\n\t\tresponses.ERROR(w, http.StatusUnauthorized, fmt.Errorf(\"[FATAL] Unauthorized\"))\n\t\treturn\n\t}\n\n\t//\tO metodo ReadAll le toda a request ate encontrar algum erro, se nao encontrar erro o leitura para em EOF\n\tbody, err := ioutil.ReadAll(r.Body)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, fmt.Errorf(\"[FATAL] it couldn't read the body, %v\\n\", err))\n\t\treturn\n\t}\n\n\t//\tExtrai o cod_usuario do body\n\ttokenID, err := auth.ExtractTokenID(r)\n\tif err != nil {\n\t\tresponses.ERROR(w, http.StatusUnauthorized, errors.New(\"Unauthorized\"))\n\t\treturn\n\t}\n\n\tassunto := models.Assunto{}\n\tlogAssunto := models.Log{}\n\n\t//\tUnmarshal analisa o JSON recebido e armazena na struct assunto referenciada (&struct)\n\tif err = json.Unmarshal(body, &assunto); err != nil {\n\t\tresponses.ERROR(w, http.StatusUnprocessableEntity, fmt.Errorf(\"[FATAL] ERROR: 422, %v\\n\", err))\n\t\treturn\n\t}\n\n\t//\tValidacao de estrutura\n\tif err = validation.Validator.Struct(assunto); err != nil {\n\t\tlog.Printf(\"[WARN] invalid information, because, %v\\n\", fmt.Errorf(\"[FATAL] validation error!, %v\\n\", err))\n\t\tw.WriteHeader(http.StatusPreconditionFailed)\n\t\treturn\n\t}\n\n\t//\tSaveAssunto eh o metodo que faz a conexao com banco de dados e salva os dados recebidos\n\tassuntoCreated, err := assunto.SaveAssunto(server.DB)\n\tif err != nil {\n\t\tformattedError := config.FormatError(err.Error())\n\t\tresponses.ERROR(w, http.StatusInternalServerError, fmt.Errorf(\"[FATAL] it couldn't save in database, %v\\n\", formattedError))\n\t\treturn\n\t}\n\n\t//\tParametros de entrada(nome_server, chave_primaria, nome_tabela, operacao, id_usuario)\n\terr = logAssunto.LogAssunto(server.DB, assuntoCreated.CodAssunto, \"assunto\", \"i\", tokenID)\n\tif err != nil {\n\t\tformattedError := config.FormatError(err.Error())\n\t\tresponses.ERROR(w, http.StatusInternalServerError, fmt.Errorf(\"[FATAL] it couldn't save log in database, %v\\n\", formattedError))\n\t\treturn\n\t}\n\n\tw.Header().Set(\"Location\", fmt.Sprintf(\"%s%s/%d\", r.Host, r.RequestURI, assuntoCreated.CodAssunto))\n\n\t//\tAo final retorna o Status 201 e o JSON da struct que foi criada\n\tresponses.JSON(w, http.StatusCreated, assuntoCreated)\n}", "title": "" }, { "docid": "30cd6d1569eff4060209111040842bf4", "score": "0.46322715", "text": "func (t *TestPersister) CreateAppeal(appeal *model.Appeal) error {\n\tchallengeID := int(appeal.OriginalChallengeID().Int64())\n\tif t.Appeals == nil {\n\t\tt.Appeals = map[int]*model.Appeal{}\n\t}\n\tt.Appeals[challengeID] = appeal\n\treturn nil\n}", "title": "" }, { "docid": "e374d23f0668d144f42ad28785795963", "score": "0.4598318", "text": "func (c *FakeSubjectAccessDelegations) Create(subjectAccessDelegation *v1alpha1.SubjectAccessDelegation) (result *v1alpha1.SubjectAccessDelegation, err error) {\n\tobj, err := c.Fake.\n\t\tInvokes(testing.NewCreateAction(subjectaccessdelegationsResource, c.ns, subjectAccessDelegation), &v1alpha1.SubjectAccessDelegation{})\n\n\tif obj == nil {\n\t\treturn nil, err\n\t}\n\treturn obj.(*v1alpha1.SubjectAccessDelegation), err\n}", "title": "" }, { "docid": "88145f336e4a7f8db58e4fa3e6814c77", "score": "0.45939308", "text": "func (c Client) New(params *stripe.CreditNoteParams) (*stripe.CreditNote, error) {\n\tcreditnote := &stripe.CreditNote{}\n\terr := c.B.Call(\n\t\thttp.MethodPost,\n\t\t\"/v1/credit_notes\",\n\t\tc.Key,\n\t\tparams,\n\t\tcreditnote,\n\t)\n\treturn creditnote, err\n}", "title": "" }, { "docid": "422bd6f8481f43b566131a821ce849f5", "score": "0.45862025", "text": "func CreateAntiTamper(client *golangsdk.ServiceClient, policyId string, opts CreateAntiTamperOpts) (*AntiTamperRule, error) {\n\tb, err := build.RequestBody(opts, \"\")\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// POST /v1/{project_id}/waf/policy/{policy_id}/antitamper\n\traw, err := client.Post(client.ServiceURL(\"waf\", \"policy\", policyId, \"antitamper\"), b,\n\t\tnil, &golangsdk.RequestOpts{\n\t\t\tOkCodes: []int{200},\n\t\t\tMoreHeaders: map[string]string{\"Content-Type\": \"application/json;charset=utf8\"},\n\t\t})\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar res AntiTamperRule\n\terr = extract.Into(raw.Body, &res)\n\treturn &res, err\n}", "title": "" }, { "docid": "048db2ff813425600d19071276c785c6", "score": "0.457511", "text": "func PostNote(n models.Note) (status int) {\n\tq := `INSERT INTO\n\t\t\tnotes(user_id, title, description, updated_at)\n\t\t\tVALUES($1, $2, $3, now())`\n\tdb := configuration.GetConnection()\n\tdefer db.Close()\n\tstmt, err := db.Prepare(q)\n\tif err != nil {\n\t\tlog.Println(\"Error al preparar consulta\", err)\n\t\tstatus = http.StatusInternalServerError\n\t\treturn\n\t}\n\tdefer stmt.Close()\n\tr, err := stmt.Exec(n.UserID, n.Title, n.Description)\n\tif err != nil {\n\t\tlog.Println(\"Error al insertar nota\", err)\n\t\tstatus = http.StatusBadRequest\n\t\treturn\n\t}\n\ti, err := r.RowsAffected()\n\tif err != nil || i != 1 {\n\t\tlog.Println(\"Se esperaba una fila afectada\")\n\t\tstatus = http.StatusInternalServerError\n\t\treturn\n\t}\n\tstatus = http.StatusCreated\n\treturn\n}", "title": "" }, { "docid": "5caf9ae281513b5772a863c4ee8ff0e0", "score": "0.4573844", "text": "func AddNote(w http.ResponseWriter, r *http.Request) {\n\terrs := []error{}\n\tnote := notes.Note{}\n\tjsoniter.NewDecoder(r.Body).Decode(&note)\n\n\tnote, fails, err := notes.AddNote(note)\n\tif err != nil {\n\t\terrs = append(errs, err)\n\t}\n\n\thelpers.NewResponse(note, fails, errs).Send(w)\n}", "title": "" }, { "docid": "d06eae4011cca1734131ad130ba6dfe0", "score": "0.4565368", "text": "func (vk *VK) NotesCreateComment(params Params) (response int, err error) {\n\terr = vk.RequestUnmarshal(\"notes.createComment\", &response, params)\n\treturn\n}", "title": "" }, { "docid": "2f4e484ab968b966a4f1fd505c16f4c9", "score": "0.45325464", "text": "func (c *Converter) WriteAdmonition(a *ast.Admonition) {\n\t//writer == \"NOTE:\" || writer == \"TIP:\" || writer == \"IMPORTANT:\" || writer == \"WARNING:\" || writer == \"CAUTION:\":\n\tvar kind string\n\tif a.Kind == \"CAUTION\" {\n\t\tkind = \"danger\"\n\t} else {\n\t\tkind = strings.ToLower(a.Kind)\n\t}\n\tc.WriteString(fmt.Sprintf(\"!!! %s\\n%v \", kind, c.curIndent))\n\tc.WriteContainerBlock(a.Content, false)\n\t//c.WriteParagraph(a.Content, false, w)\n\tc.WriteString(\"\\n\")\n}", "title": "" }, { "docid": "0c45388b1681b641379e97a09908bafe", "score": "0.45314544", "text": "func TestCreateIdentity(t *testing.T) {\n\n\tf := textFixture{}\n\tf.setup()\n\tdefer f.close()\n\n\t// Create with nil request\n\t_, err := f.caClient.CreateIdentity(nil)\n\tif err == nil {\n\t\tt.Fatal(\"Expected error with nil request\")\n\t}\n\n\t// Create without required parameters\n\t_, err = f.caClient.CreateIdentity(&api.IdentityRequest{Affiliation: \"Org1\"})\n\tif err == nil || !strings.Contains(err.Error(), \"ID is required\") {\n\t\tt.Fatal(\"Expected error due to missing required parameters\")\n\t}\n\n\t// Create identity with valid request\n\tvar attributes []api.Attribute\n\tattributes = append(attributes, api.Attribute{Name: \"test1\", Value: \"test2\"})\n\tattributes = append(attributes, api.Attribute{Name: \"test2\", Value: \"test3\"})\n\tidentity, err := f.caClient.CreateIdentity(&api.IdentityRequest{ID: \"test\", Affiliation: \"test\", Attributes: attributes})\n\tif err != nil {\n\t\tt.Fatalf(\"create identity return error %s\", err)\n\t}\n\tif identity.Secret != \"top-secret\" {\n\t\tt.Fatalf(\"create identity returned wrong value %s\", identity.Secret)\n\t}\n\n\t// Create identity with ID only\n\tidentity, err = f.caClient.CreateIdentity(&api.IdentityRequest{ID: \"test1\"})\n\tif err != nil {\n\t\tt.Fatalf(\"create identity return error %s\", err)\n\t}\n\tif identity.Secret != \"top-secret\" {\n\t\tt.Fatalf(\"create identity returned wrong value %s\", identity.Secret)\n\t}\n}", "title": "" }, { "docid": "677844944a887dd25ed6ddb3db58cf87", "score": "0.4522628", "text": "func (mr *MockEC2MockRecorder) CreateTransitGatewayRouteTableAnnouncement(arg0 interface{}) *gomock.Call {\n\tmr.mock.ctrl.T.Helper()\n\treturn mr.mock.ctrl.RecordCallWithMethodType(mr.mock, \"CreateTransitGatewayRouteTableAnnouncement\", reflect.TypeOf((*MockEC2)(nil).CreateTransitGatewayRouteTableAnnouncement), arg0)\n}", "title": "" }, { "docid": "404cce0d507cca05c325f0104a0f79c9", "score": "0.45223358", "text": "func NewAT(repo ClientRepository) DBRepository {\n\treturn &dbRepository{\n\t\tclientRepo: repo,\n\t}\n}", "title": "" }, { "docid": "05f95deaa7a8e8c7f39a56bfd13c285d", "score": "0.45195353", "text": "func CreateAnchorAsciidoc(prefix string, value string, anchor bool, escape bool) string {\n\tsanitizedName := SanitizeName(value, escape)\n\n\tif anchor {\n\t\tanchorName := fmt.Sprintf(\"%s_%s\", prefix, value)\n\t\tsanitizedAnchorName := SanitizeName(anchorName, escape)\n\t\treturn fmt.Sprintf(\"[[%s]] <<%s,%s>>\", sanitizedAnchorName, sanitizedAnchorName, sanitizedName)\n\t}\n\n\treturn sanitizedName\n}", "title": "" }, { "docid": "1ca79f6fd61866a45aa94cf346fd9c81", "score": "0.4512319", "text": "func TestWrapInCreate(t *testing.T) {\n\tbaseNoteFn := func() (vocab.ActivityStreamsNote, vocab.ActivityStreamsCreate) {\n\t\tn := streams.NewActivityStreamsNote()\n\t\tid := streams.NewJSONLDIdProperty()\n\t\tid.Set(mustParse(testNoteId1))\n\t\tn.SetJSONLDId(id)\n\t\tcr := streams.NewActivityStreamsCreate()\n\t\top := streams.NewActivityStreamsObjectProperty()\n\t\top.AppendActivityStreamsNote(n)\n\t\tcr.SetActivityStreamsObject(op)\n\t\tactorProp := streams.NewActivityStreamsActorProperty()\n\t\tactorProp.AppendIRI(mustParse(testPersonIRI))\n\t\tcr.SetActivityStreamsActor(actorProp)\n\t\treturn n, cr\n\t}\n\tctx := context.Background()\n\tsetupFn := func(ctl *gomock.Controller) (c *MockCommonBehavior, fp *MockFederatingProtocol, sp *MockSocialProtocol, db *MockDatabase, cl *MockClock, a DelegateActor) {\n\t\tsetupData()\n\t\tc = NewMockCommonBehavior(ctl)\n\t\tfp = NewMockFederatingProtocol(ctl)\n\t\tsp = NewMockSocialProtocol(ctl)\n\t\tdb = NewMockDatabase(ctl)\n\t\tcl = NewMockClock(ctl)\n\t\ta = &sideEffectActor{\n\t\t\tcommon: c,\n\t\t\ts2s: fp,\n\t\t\tc2s: sp,\n\t\t\tdb: db,\n\t\t\tclock: cl,\n\t\t}\n\t\treturn\n\t}\n\tt.Run(\"CreateHasObjectAndActor\", func(t *testing.T) {\n\t\t// Setup\n\t\tctl := gomock.NewController(t)\n\t\tdefer ctl.Finish()\n\t\t_, _, _, mockDb, _, a := setupFn(ctl)\n\t\tn, expect := baseNoteFn()\n\t\t// Mock\n\t\tmockDb.EXPECT().Lock(ctx, mustParse(testMyOutboxIRI))\n\t\tmockDb.EXPECT().ActorForOutbox(ctx, mustParse(testMyOutboxIRI)).Return(\n\t\t\tmustParse(testPersonIRI), nil)\n\t\tmockDb.EXPECT().Unlock(ctx, mustParse(testMyOutboxIRI))\n\t\t// Run & Verify\n\t\tgot, err := a.WrapInCreate(ctx, n, mustParse(testMyOutboxIRI))\n\t\tassertEqual(t, err, nil)\n\t\tassertByteEqual(t, mustSerializeToBytes(got), mustSerializeToBytes(expect))\n\t})\n\tt.Run(\"CreateHasTo\", func(t *testing.T) {\n\t\t// Setup\n\t\tctl := gomock.NewController(t)\n\t\tdefer ctl.Finish()\n\t\t_, _, _, mockDb, _, a := setupFn(ctl)\n\t\tn, expect := baseNoteFn()\n\t\tto := streams.NewActivityStreamsToProperty()\n\t\tto.AppendIRI(mustParse(testFederatedActorIRI))\n\t\tto.AppendIRI(mustParse(testFederatedActorIRI2))\n\t\tn.SetActivityStreamsTo(to)\n\t\texpect.SetActivityStreamsTo(to)\n\t\t// Mock\n\t\tmockDb.EXPECT().Lock(ctx, mustParse(testMyOutboxIRI))\n\t\tmockDb.EXPECT().ActorForOutbox(ctx, mustParse(testMyOutboxIRI)).Return(\n\t\t\tmustParse(testPersonIRI), nil)\n\t\tmockDb.EXPECT().Unlock(ctx, mustParse(testMyOutboxIRI))\n\t\t// Run & Verify\n\t\tgot, err := a.WrapInCreate(ctx, n, mustParse(testMyOutboxIRI))\n\t\tassertEqual(t, err, nil)\n\t\tassertByteEqual(t, mustSerializeToBytes(got), mustSerializeToBytes(expect))\n\t})\n\tt.Run(\"CreateHasCc\", func(t *testing.T) {\n\t\t// Setup\n\t\tctl := gomock.NewController(t)\n\t\tdefer ctl.Finish()\n\t\t_, _, _, mockDb, _, a := setupFn(ctl)\n\t\tn, expect := baseNoteFn()\n\t\tcc := streams.NewActivityStreamsCcProperty()\n\t\tcc.AppendIRI(mustParse(testFederatedActorIRI))\n\t\tcc.AppendIRI(mustParse(testFederatedActorIRI2))\n\t\tn.SetActivityStreamsCc(cc)\n\t\texpect.SetActivityStreamsCc(cc)\n\t\t// Mock\n\t\tmockDb.EXPECT().Lock(ctx, mustParse(testMyOutboxIRI))\n\t\tmockDb.EXPECT().ActorForOutbox(ctx, mustParse(testMyOutboxIRI)).Return(\n\t\t\tmustParse(testPersonIRI), nil)\n\t\tmockDb.EXPECT().Unlock(ctx, mustParse(testMyOutboxIRI))\n\t\t// Run & Verify\n\t\tgot, err := a.WrapInCreate(ctx, n, mustParse(testMyOutboxIRI))\n\t\tassertEqual(t, err, nil)\n\t\tassertByteEqual(t, mustSerializeToBytes(got), mustSerializeToBytes(expect))\n\t})\n\tt.Run(\"CreateHasBto\", func(t *testing.T) {\n\t\t// Setup\n\t\tctl := gomock.NewController(t)\n\t\tdefer ctl.Finish()\n\t\t_, _, _, mockDb, _, a := setupFn(ctl)\n\t\tn, expect := baseNoteFn()\n\t\tbto := streams.NewActivityStreamsBtoProperty()\n\t\tbto.AppendIRI(mustParse(testFederatedActorIRI))\n\t\tbto.AppendIRI(mustParse(testFederatedActorIRI2))\n\t\tn.SetActivityStreamsBto(bto)\n\t\texpect.SetActivityStreamsBto(bto)\n\t\t// Mock\n\t\tmockDb.EXPECT().Lock(ctx, mustParse(testMyOutboxIRI))\n\t\tmockDb.EXPECT().ActorForOutbox(ctx, mustParse(testMyOutboxIRI)).Return(\n\t\t\tmustParse(testPersonIRI), nil)\n\t\tmockDb.EXPECT().Unlock(ctx, mustParse(testMyOutboxIRI))\n\t\t// Run & Verify\n\t\tgot, err := a.WrapInCreate(ctx, n, mustParse(testMyOutboxIRI))\n\t\tassertEqual(t, err, nil)\n\t\tassertByteEqual(t, mustSerializeToBytes(got), mustSerializeToBytes(expect))\n\t})\n\tt.Run(\"CreateHasBcc\", func(t *testing.T) {\n\t\t// Setup\n\t\tctl := gomock.NewController(t)\n\t\tdefer ctl.Finish()\n\t\t_, _, _, mockDb, _, a := setupFn(ctl)\n\t\tn, expect := baseNoteFn()\n\t\tbcc := streams.NewActivityStreamsBccProperty()\n\t\tbcc.AppendIRI(mustParse(testFederatedActorIRI))\n\t\tbcc.AppendIRI(mustParse(testFederatedActorIRI2))\n\t\tn.SetActivityStreamsBcc(bcc)\n\t\texpect.SetActivityStreamsBcc(bcc)\n\t\t// Mock\n\t\tmockDb.EXPECT().Lock(ctx, mustParse(testMyOutboxIRI))\n\t\tmockDb.EXPECT().ActorForOutbox(ctx, mustParse(testMyOutboxIRI)).Return(\n\t\t\tmustParse(testPersonIRI), nil)\n\t\tmockDb.EXPECT().Unlock(ctx, mustParse(testMyOutboxIRI))\n\t\t// Run & Verify\n\t\tgot, err := a.WrapInCreate(ctx, n, mustParse(testMyOutboxIRI))\n\t\tassertEqual(t, err, nil)\n\t\tassertByteEqual(t, mustSerializeToBytes(got), mustSerializeToBytes(expect))\n\t})\n\tt.Run(\"CreateHasAudience\", func(t *testing.T) {\n\t\t// Setup\n\t\tctl := gomock.NewController(t)\n\t\tdefer ctl.Finish()\n\t\t_, _, _, mockDb, _, a := setupFn(ctl)\n\t\tn, expect := baseNoteFn()\n\t\taud := streams.NewActivityStreamsAudienceProperty()\n\t\taud.AppendIRI(mustParse(testFederatedActorIRI))\n\t\taud.AppendIRI(mustParse(testFederatedActorIRI2))\n\t\tn.SetActivityStreamsAudience(aud)\n\t\texpect.SetActivityStreamsAudience(aud)\n\t\t// Mock\n\t\tmockDb.EXPECT().Lock(ctx, mustParse(testMyOutboxIRI))\n\t\tmockDb.EXPECT().ActorForOutbox(ctx, mustParse(testMyOutboxIRI)).Return(\n\t\t\tmustParse(testPersonIRI), nil)\n\t\tmockDb.EXPECT().Unlock(ctx, mustParse(testMyOutboxIRI))\n\t\t// Run & Verify\n\t\tgot, err := a.WrapInCreate(ctx, n, mustParse(testMyOutboxIRI))\n\t\tassertEqual(t, err, nil)\n\t\tassertByteEqual(t, mustSerializeToBytes(got), mustSerializeToBytes(expect))\n\t})\n\tt.Run(\"CreateHasPublished\", func(t *testing.T) {\n\t\t// Setup\n\t\tctl := gomock.NewController(t)\n\t\tdefer ctl.Finish()\n\t\t_, _, _, mockDb, _, a := setupFn(ctl)\n\t\tn, expect := baseNoteFn()\n\t\tpub := streams.NewActivityStreamsPublishedProperty()\n\t\tpub.Set(time.Now())\n\t\tn.SetActivityStreamsPublished(pub)\n\t\texpect.SetActivityStreamsPublished(pub)\n\t\t// Mock\n\t\tmockDb.EXPECT().Lock(ctx, mustParse(testMyOutboxIRI))\n\t\tmockDb.EXPECT().ActorForOutbox(ctx, mustParse(testMyOutboxIRI)).Return(\n\t\t\tmustParse(testPersonIRI), nil)\n\t\tmockDb.EXPECT().Unlock(ctx, mustParse(testMyOutboxIRI))\n\t\t// Run & Verify\n\t\tgot, err := a.WrapInCreate(ctx, n, mustParse(testMyOutboxIRI))\n\t\tassertEqual(t, err, nil)\n\t\tassertByteEqual(t, mustSerializeToBytes(got), mustSerializeToBytes(expect))\n\t})\n}", "title": "" }, { "docid": "f8e0533f220c7efac5432b539aa5c74b", "score": "0.4485146", "text": "func (ideaser *IdeaService ) CreateIdea(idea *entity.Idea ) *entity.Idea {\n\tideas , era := ideaser.IdeaRepo.CreateIdea(idea )\n\tif era != nil {\n\t\treturn nil \n\t}\n\treturn ideas \n}", "title": "" }, { "docid": "a6067ac602fb08cd5e7f5a1a71adc213", "score": "0.44739026", "text": "func CreateNoteDecode(_ context.Context, r *http.Request) (interface{}, error) {\n\tvar req note.CreateNoteRequest\n\n\terr := json.NewDecoder(r.Body).Decode(&req)\n\treturn req, err\n}", "title": "" }, { "docid": "76b6922adfdb65b09a1948d9446b0a98", "score": "0.4472881", "text": "func addNote(w http.ResponseWriter, r *http.Request, _ httprouter.Params) {\n \n if r.Method != \"POST\" {\n w.Header().Set(\"Allow\", \"POST\")\n http.Error(w, http.StatusText(405), 405)\n return\n }\n \n title, HTTPerr := ioutil.ReadAll(r.Body);\n \n if HTTPerr != nil {\n fmt.Fprintf(w, \"%s\", HTTPerr)\n }\n \n returnValue, err := models.InsertNote(string(title[:]))\n if err != nil {\n log.Fatal(err)\n return\n }\n \n fmt.Fprintf(w, \"ID de la nouvelle note :\"+returnValue+\"\\n\")\n}", "title": "" }, { "docid": "0dd3ce3510210e651e80542226d34ccf", "score": "0.4465678", "text": "func (k Keeper) CreateAgency(ctx sdk.Context, agency types.Agency) {\n\tstore := ctx.KVStore(k.storeKey)\n\t// key := []byte(types.AgencyPrefix + commit.SolutionScavengerHash)\n\tkey := getAgencyKey(agency.Principal, agency.Agent)\n\tvalue := k.cdc.MustMarshalBinaryLengthPrefixed(agency)\n\tstore.Set(key, value)\n}", "title": "" }, { "docid": "2fff286b4301dfba18d5ec1ad624df72", "score": "0.44489896", "text": "func NewFootnote(ref string, elements interface{}) (Footnote, error) {\n\t// footnote with content get an ID\n\tif elements, ok := elements.([]interface{}); ok {\n\t\treturn Footnote{\n\t\t\t// ID is only set during document processing\n\t\t\tRef: ref,\n\t\t\tElements: elements,\n\t\t}, nil\n\t} // footnote which are just references don't get an ID, so we don't increment the sequence\n\treturn Footnote{\n\t\tRef: ref,\n\t\tElements: []interface{}{},\n\t}, nil\n}", "title": "" }, { "docid": "35e62349e3427d5eb0737094d7861206", "score": "0.4440681", "text": "func (s *Service) CreationArticle(c context.Context, arg *model.ArgAidMid) (res *model.Article, err error) {\n\terr = s.client.Call(c, _creationArticle, arg, &res)\n\treturn\n}", "title": "" }, { "docid": "e972aae96728ec4c45335d7c7da94c80", "score": "0.44380265", "text": "func (c Client) New(params *stripe.CreditNoteParams) (*stripe.CreditNote, error) {\n\tcn := &stripe.CreditNote{}\n\terr := c.B.Call(http.MethodPost, \"/v1/credit_notes\", c.Key, params, cn)\n\treturn cn, err\n}", "title": "" }, { "docid": "4402ae278c49ebfd2722b6b2febad149", "score": "0.44371077", "text": "func CreateMessageAttestation(pgpKey *secrets.PgpKey, message string) (string, error) {\n\t// First Create a signer Entity from public and private keys.\n\tsigner, err := createEntityFromKeys(pgpKey.PublicKey(), pgpKey.PrivateKey())\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"creating entity keys\")\n\t}\n\n\tb := new(bytes.Buffer)\n\t// Armor Encode it.\n\tarmorWriter, errEncode := armor.Encode(b, openpgp.SignatureType, make(map[string]string))\n\tif errEncode != nil {\n\t\treturn \"\", errors.Wrap(err, \"encoding data\")\n\t}\n\t// Finally Sign the Text.\n\tw, err := openpgp.Sign(armorWriter, signer, nil, &pgpConfig)\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"opengpg signing\")\n\t}\n\n\t_, err = w.Write([]byte(message))\n\tif err != nil {\n\t\treturn \"\", errors.Wrap(err, \"writing signed data\")\n\t}\n\tw.Close()\n\tarmorWriter.Close()\n\treturn string(b.Bytes()), nil\n}", "title": "" }, { "docid": "66933b7e1a42236af1ddda0dd5d30f3d", "score": "0.440827", "text": "func DoTestNoterAddNote(t *testing.T, storage note.Storage, calculator note.Calculator) {\n\t// You could also create a constructor for Noter\n\tnoter := note.Noter{\n\t\tStorage: storage,\n\t\tCalculator: calculator,\n\t}\n\n\ttitle := \"good title\"\n\ttext := \"bad content\"\n\n\tn, err := noter.AddNote(title, text)\n\tassert.NoError(t, err)\n\tassert.Equal(t, title, n.Title)\n\tassert.Equal(t, text, n.Text)\n}", "title": "" }, { "docid": "bb23e3ffdd4ce8cd49d16bf375f59a75", "score": "0.44079465", "text": "func (t *Handler) Create(obj interface{}) bool {\n\tfailed := true\n\tswitch obj.(type) {\n\tcase *apps_v1alpha.AuthorityRequest:\n\t\tauthorityRequestCopy := obj.(*apps_v1alpha.AuthorityRequest).DeepCopy()\n\t\t// Create a authority on the cluster\n\t\tauthority := apps_v1alpha.Authority{}\n\t\tauthority.SetName(authorityRequestCopy.GetName())\n\t\tauthority.Spec.Address = authorityRequestCopy.Spec.Address\n\t\tauthority.Spec.Contact = authorityRequestCopy.Spec.Contact\n\t\tauthority.Spec.FullName = authorityRequestCopy.Spec.FullName\n\t\tauthority.Spec.ShortName = authorityRequestCopy.Spec.ShortName\n\t\tauthority.Spec.URL = authorityRequestCopy.Spec.URL\n\t\tauthority.Spec.Enabled = true\n\t\t_, err := t.edgenetClientset.AppsV1alpha().Authorities().Create(context.TODO(), authority.DeepCopy(), metav1.CreateOptions{})\n\t\tif err == nil {\n\t\t\tfailed = false\n\t\t\tt.edgenetClientset.AppsV1alpha().AuthorityRequests().Delete(context.TODO(), authorityRequestCopy.GetName(), metav1.DeleteOptions{})\n\t\t}\n\t}\n\n\treturn failed\n}", "title": "" }, { "docid": "d9f488b339538a32da1b6e6774ceea8d", "score": "0.4404364", "text": "func CreateKA(details map[string]interface{}) error {\n\tresult := hasDefinationValidDetails(details)\n\tif !result.IsValid {\n\t\treturn errors.New(\"Invalid name for the ka\")\n\t}\n\tsql := \"INSERT INTO `subject_area_ka` (`content`, `source`, `code`, `title`, `subject`) VALUES (?, ?, ?, ?, ?)\"\n\tquery, err := database.Connection.Prepare(sql)\n\tif err != nil {\n\t\treturn err\n\t}\n\tcontent := details[\"ka-content\"].(string)\n\tsource := details[\"ka-source\"].(string)\n\tsubject := details[\"ka-subject\"].(int)\n\tcode := details[\"ka-code\"].(string)\n\ttitle := details[\"ka-title\"].(string)\n\t_, err = query.Exec(content, source, code, title, subject)\n\treturn err\n}", "title": "" }, { "docid": "2a1e62797c9552390e90e9bb03050d84", "score": "0.43946984", "text": "func (a *ACL) Create(acl *ACLEntry, q *WriteOptions) (string, *WriteMeta, error) {\n\tr := a.c.newRequest(\"PUT\", \"/v1/acl/create\")\n\tr.setWriteOptions(q)\n\tr.obj = acl\n\trtt, resp, err := requireOK(a.c.doRequest(r))\n\tif err != nil {\n\t\treturn \"\", nil, err\n\t}\n\tdefer resp.Body.Close()\n\n\twm := &WriteMeta{RequestTime: rtt}\n\tvar out struct{ ID string }\n\tif err := decodeBody(resp, &out); err != nil {\n\t\treturn \"\", nil, err\n\t}\n\treturn out.ID, wm, nil\n}", "title": "" }, { "docid": "15b801550e167f99a5b568669cc5ff43", "score": "0.43893784", "text": "func (app App) CreateLease(l *Lease) error {\n\tif l.Tenant == 0 {\n\t\treturn fmt.Errorf(\"lease must have a valid tenant\")\n\t}\n\tif l.Site == 0 {\n\t\treturn fmt.Errorf(\"lease must have a valid site\")\n\t}\n\treturn app.Save(l)\n}", "title": "" }, { "docid": "b6b6b82d191da8c81b49d9cb9c4038af", "score": "0.43886352", "text": "func CreateOAIAction(input action.Input) action.Output {\n\tidentity, err := CreateOAI(\n\t\tinput.Payload[\"oai:comment\"].(string),\n\t)\n\n\tinput.Environment[\"oai:canonical_user\"] = *identity.S3CanonicalUserId\n\tinput.Environment[\"oai:id\"] = *identity.Id\n\n\tif err != nil {\n\t\treturn action.Output{\n\t\t\tStatus: action.ERROR,\n\t\t\tEnvironment: input.Environment,\n\t\t}\n\t}\n\n\treturn action.Output{\n\t\tStatus: action.OK,\n\t\tEnvironment: input.Environment,\n\t}\n}", "title": "" }, { "docid": "b85b01915491022cb989e0f7e7fa28c3", "score": "0.43868408", "text": "func Create(input CreateInput) *aadpodv1.AzureIdentity {\n\tExpect(input.Creator).NotTo(BeNil(), \"input.Creator is required for AzureIdentity.Create\")\n\tExpect(input.Config).NotTo(BeNil(), \"input.Config is required for AzureIdentity.Create\")\n\tExpect(input.AzureClient).NotTo(BeNil(), \"input.AzureClient is required for AzureIdentity.Create\")\n\tExpect(input.Name).NotTo(BeEmpty(), \"input.Name is required for AzureIdentity.Create\")\n\tExpect(input.Namespace).NotTo(BeEmpty(), \"input.Namespace is required for AzureIdentity.Create\")\n\tExpect(input.IdentityName).NotTo(BeEmpty(), \"input.IdentityName is required for AzureIdentity.Create\")\n\tExpect(input.IdentityType).NotTo(BeNil(), \"input.IdentityType is required for AzureIdentity.Create\")\n\n\tBy(fmt.Sprintf(\"Creating AzureIdentity \\\"%s\\\"\", input.Name))\n\n\tidentityClientID := input.AzureClient.GetIdentityClientID(input.Config.IdentityResourceGroup, input.IdentityName)\n\tazureIdentity := &aadpodv1.AzureIdentity{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: input.Name,\n\t\t\tNamespace: input.Namespace,\n\t\t},\n\t}\n\tazureIdentity.TypeMeta = framework.TypeMeta(azureIdentity)\n\n\tif input.IdentityType == aadpodv1.UserAssignedMSI {\n\t\tazureIdentity.Spec = aadpodv1.AzureIdentitySpec{\n\t\t\tType: input.IdentityType,\n\t\t\tResourceID: fmt.Sprintf(azure.ResourceIDTemplate, input.Config.SubscriptionID, input.Config.IdentityResourceGroup, input.IdentityName),\n\t\t\tClientID: identityClientID,\n\t\t}\n\t} else {\n\t\tazureIdentity.Spec = aadpodv1.AzureIdentitySpec{\n\t\t\tType: input.IdentityType,\n\t\t\tClientID: input.SPClientID,\n\t\t\tTenantID: input.TenantID,\n\t\t\tClientPassword: input.SPClientPassword,\n\t\t}\n\t}\n\n\t// For gatekeeper test case\n\tif input.InvalidResourceID {\n\t\tazureIdentity.Spec.ResourceID = fmt.Sprintf(invalidResourceIDTemplate, input.Config.SubscriptionID, input.IdentityName)\n\t\t// Expect(input.Creator.Create(context.TODO(), azureIdentity)).ShouldNot(Succeed())\n\t\t// With https://github.com/Azure/aad-pod-identity/pull/1035 input.Creator.Create does not return\n\t\t// an error when deploying an AzureIdentity with invalid Resource ID to a gatekeeper-enabled cluster\n\t\t// For now, use json.Marshal and exec.KubectlApply\n\t} else {\n\t\tExpect(input.Creator.Create(context.TODO(), azureIdentity)).Should(Succeed())\n\t}\n\n\treturn azureIdentity\n}", "title": "" }, { "docid": "0258adb892eb20a187090918720b21da", "score": "0.43723604", "text": "func (_Accounts *AccountsTransactor) AuthorizeAttestationSigner(opts *bind.TransactOpts, signer common.Address, v uint8, r [32]byte, s [32]byte) (*types.Transaction, error) {\n\treturn _Accounts.contract.Transact(opts, \"authorizeAttestationSigner\", signer, v, r, s)\n}", "title": "" }, { "docid": "c37acf394eeacdac09953f851d9d87f7", "score": "0.43667445", "text": "func (_EAS *EASSession) Attest(request AttestationRequest) (*types.Transaction, error) {\n\treturn _EAS.Contract.Attest(&_EAS.TransactOpts, request)\n}", "title": "" }, { "docid": "5d8bbb479d33eb9d9c61426ca69ad78d", "score": "0.4365777", "text": "func TestIntentionApply_createWithID(t *testing.T) {\n\tt.Parallel()\n\n\tassert := assert.New(t)\n\tdir1, s1 := testServer(t)\n\tdefer os.RemoveAll(dir1)\n\tdefer s1.Shutdown()\n\tcodec := rpcClient(t, s1)\n\tdefer codec.Close()\n\n\ttestrpc.WaitForLeader(t, s1.RPC, \"dc1\")\n\n\t// Setup a basic record to create\n\tixn := structs.IntentionRequest{\n\t\tDatacenter: \"dc1\",\n\t\tOp: structs.IntentionOpCreate,\n\t\tIntention: &structs.Intention{\n\t\t\tID: generateUUID(),\n\t\t\tSourceName: \"test\",\n\t\t},\n\t}\n\tvar reply string\n\n\t// Create\n\terr := msgpackrpc.CallWithCodec(codec, \"Intention.Apply\", &ixn, &reply)\n\tassert.NotNil(err)\n\tassert.Contains(err, \"ID must be empty\")\n}", "title": "" }, { "docid": "92ddd96edb3c6403ee03ca2fd26778b2", "score": "0.4365316", "text": "func (s *SumSub) CreateApplicant(a *Applicant) error {\n\tresp, err := req.Post(s.URL(\"resources/applicants\"), s.authHeader(), req.BodyJSON(a))\n\tif err := handleResponse(resp, err); err != nil {\n\t\treturn err\n\t}\n\n\treturn resp.ToJSON(&a)\n}", "title": "" }, { "docid": "bdc42b91f6f74bb79a9ece29798394bd", "score": "0.43645105", "text": "func (c *Client) PublishNote(ctx context.Context, note models.SystemIntakeNote) error {\n\tintakeObject := translation.TranslatableNote(note)\n\treturn c.publishIntakeObject(ctx, &intakeObject)\n}", "title": "" }, { "docid": "626da2860817ad06ad34551220a53289", "score": "0.43632302", "text": "func (n NotesService) Create(id string, data db.Data) error {\n\thash := sha3.Sum256([]byte(id))\n\tn.store.Put(base64.StdEncoding.EncodeToString(hash[:]), data)\n\treturn nil\n}", "title": "" }, { "docid": "ef4690f7cfe54480a478a0a15755940d", "score": "0.43629804", "text": "func (a *Adjustment) Create() error {\n\tif a.UUID != \"\" {\n\t\treturn RecurlyError{statusCode: 400, Description: \"Adjustment Already created\"}\n\t}\n\treturn a.r.doCreate(&a, ACCOUNTS+\"/\"+a.AccountCode+\"/\"+a.endpoint)\n}", "title": "" }, { "docid": "62d7f67f7fa8c8e62cb3b9771b9ffff9", "score": "0.43628854", "text": "func (api *API) CreateArticle(w http.ResponseWriter, r *http.Request) {\n\t/*\n\t\tcookie, err := r.Cookie(\"token\")\n\t\tif err != nil {\n\t\t\tw.WriteHeader(http.StatusForbidden)\n\t\t\treturn\n\t\t}\n\t\ttoken := cookie.Value\n\t*/\n\ttoken := \"abcdefghijklmnopqrstuvwxyz\"\n\n\tarticleReq := new(model.ArticleReq)\n\terrs := binding.Bind(r, articleReq)\n\tif errs != nil {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(errs.Error()))\n\t\treturn\n\t}\n\n\tif res, err := govalidator.ValidateStruct(articleReq); res == false {\n\t\tw.WriteHeader(http.StatusBadRequest)\n\t\tw.Write([]byte(err.Error()))\n\t\treturn\n\t}\n\n\tarticle := model.InitializeArticle()\n\tarticle.ID = articleReq.ID\n\n\t// Persisting skillset\n\terrArticleCreation := api.Repo.CreateArticle(article)\n\tif errArticleCreation != nil {\n\t\tw.WriteHeader(500)\n\t\treturn\n\t}\n\t// Publish message to nsq\n\t// Token is assigned from node frontend\n\tmes := &model.ArticleCreatedMsg{\n\t\tID: article.ID,\n\t\tSession: token,\n\t}\n\tmesStr, _ := json.Marshal(mes)\n\tgo api.PublishNSQMes(\"article_created\", []byte(mesStr))\n\n\t// Response\n\tw.Header().Set(\"Content-type\", \"application/json\")\n\tw.WriteHeader(http.StatusCreated)\n\tjson.NewEncoder(w).Encode(article)\n}", "title": "" }, { "docid": "2bd125c054d183462d84d58906becc15", "score": "0.43567228", "text": "func (app *ClientApproval) Create() error {\n\tconst q = `INSERT INTO ClientApprovals (uuid, scope, clientUUID, accountUUID, createdAt, updatedAt)\n\t VALUES ($1, $2, $3, $4, now(), now())\n\t RETURNING *`\n\n\tif app.UUID == \"\" {\n\t\tapp.UUID = uuid.NewRandom().String()\n\t}\n\n\treturn database.Get(app, q, app.UUID, app.Scope, app.ClientUUID, app.AccountUUID)\n}", "title": "" }, { "docid": "316312938b59f640bba63863290efe63", "score": "0.4351222", "text": "func CreateBeneficiary(beneficiary *Detail,userId string)(err error){\n\terr=Validate(beneficiary)\n\tif err!=nil{\n\t\treturn err\n\t}\n\tbeneficiary.ID= utilities.CreateID(Prefix, IDLengthExcludingPrefix)\n\tbeneficiary.UserId=userId\n\tif err=config.DB.Create(beneficiary).Error; err!=nil{\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f805ba541517282aa048914da81d2315", "score": "0.43449438", "text": "func Create(input CreateInput) *aadpodv1.AzureIdentity {\n\tExpect(input.Creator).NotTo(BeNil(), \"input.Creator is required for AzureIdentity.Create\")\n\tExpect(input.Config).NotTo(BeNil(), \"input.Config is required for AzureIdentity.Create\")\n\tExpect(input.AzureClient).NotTo(BeNil(), \"input.AzureClient is required for AzureIdentity.Create\")\n\tExpect(input.Name).NotTo(BeEmpty(), \"input.Name is required for AzureIdentity.Create\")\n\tExpect(input.Namespace).NotTo(BeEmpty(), \"input.Namespace is required for AzureIdentity.Create\")\n\tExpect(input.IdentityName).NotTo(BeEmpty(), \"input.IdentityName is required for AzureIdentity.Create\")\n\tExpect(input.IdentityType).NotTo(BeNil(), \"input.IdentityType is required for AzureIdentity.Create\")\n\n\tBy(fmt.Sprintf(\"Creating AzureIdentity \\\"%s\\\"\", input.Name))\n\n\tidentityClientID := input.AzureClient.GetIdentityClientID(input.IdentityName)\n\tazureIdentity := &aadpodv1.AzureIdentity{\n\t\tObjectMeta: metav1.ObjectMeta{\n\t\t\tName: input.Name,\n\t\t\tNamespace: input.Namespace,\n\t\t},\n\t\t// TODO: account for SP type\n\t\tSpec: aadpodv1.AzureIdentitySpec{\n\t\t\tType: input.IdentityType,\n\t\t\tResourceID: fmt.Sprintf(azure.ResourceIDTemplate, input.Config.SubscriptionID, input.Config.IdentityResourceGroup, input.IdentityName),\n\t\t\tClientID: identityClientID,\n\t\t},\n\t}\n\n\t// For gatekeeper test case\n\tif input.InvalidResourceID {\n\t\tazureIdentity.Spec.ResourceID = fmt.Sprintf(invalidResourceIDTemplate, input.Config.SubscriptionID, input.IdentityName)\n\t\tEventually(func() error {\n\t\t\treturn input.Creator.Create(context.TODO(), azureIdentity)\n\t\t}, framework.CreateTimeout, framework.CreatePolling).ShouldNot(Succeed())\n\t} else {\n\t\tEventually(func() error {\n\t\t\treturn input.Creator.Create(context.TODO(), azureIdentity)\n\t\t}, framework.CreateTimeout, framework.CreatePolling).Should(Succeed())\n\t}\n\n\treturn azureIdentity\n}", "title": "" }, { "docid": "110babd2ebfd1c1acdc13f83ce653832", "score": "0.43239418", "text": "func (c *Controller) Create(obj interface{}) {\n\tlevel.Debug(c.logger).Log(\"msg\", \"Called function: Create\")\n\tingressObj := obj.(*v1beta1.Ingress)\n\n\tr53, _ := ingressObj.Annotations[\"ingress.net/route53\"]\n\n\tisR53, _ := strconv.ParseBool(r53)\n\n\tif isR53 {\n\t\tlevel.Info(c.logger).Log(\"msg\", \"Creation of an ingress resource detected\", \"ingressName\", ingressObj.Name, \"ingressNamespace\", ingressObj.Namespace)\n\n\t\tc.createRecordSet(ingressObj)\n\t}\n}", "title": "" } ]
3d2b2500a772ded1c9b021154be50a34
PutByte writes the given byte to the given effective address.
[ { "docid": "c4cbb3f64f858a989d538336a8b2af15", "score": "0.8430324", "text": "func (m *Memory) PutByte(v byte, base, offset uint32) {\n\tm.bytes[effectiveAddress(base, offset)] = v\n}", "title": "" } ]
[ { "docid": "94819eabba50e2bbc95ff43bde66493e", "score": "0.8075227", "text": "func (m *Memory) PutByte(v byte, base, offset uint32) {\n\tp := (*byte)(unsafe.Pointer(m.start + uintptr(base) + uintptr(offset)))\n\t*p = v\n}", "title": "" }, { "docid": "4f61a30e3810ca235ceae82bfafc371e", "score": "0.7535633", "text": "func (o *Out) PutByte(x byte) {\n\to.PutUInt8(x)\n}", "title": "" }, { "docid": "e4798b11bebd75e0a66544a92ad1d3c1", "score": "0.73000187", "text": "func (w *writer) PutByte(v byte) {\n\tw.err = w.buf.WriteByte(v)\n}", "title": "" }, { "docid": "f725c16d18cedee1815c47f5c34bed56", "score": "0.7292167", "text": "func (p *Process) WriteByte(offset uintptr, value byte) error {\n\tvar (\n\t\tvaluePtr = (uintptr)(unsafe.Pointer(&value))\n\t)\n\n\treturn p.Write(offset, valuePtr, unsafe.Sizeof(value))\n}", "title": "" }, { "docid": "761fa4e7fae9e2117e6ed5bc3e8f27a9", "score": "0.72714484", "text": "func (m *Memory) PutByteAt(v byte, offset uint32) {\n\tp := (*byte)(unsafe.Pointer(m.start + uintptr(offset)))\n\t*p = v\n}", "title": "" }, { "docid": "b9df58859fe6a4f8d5c0a81c4a7e4b0b", "score": "0.71495134", "text": "func putByte(buf []byte, val byte) int {\n\tbuf[0] = val\n\treturn 1\n}", "title": "" }, { "docid": "cb4d2b872889a63bd2291a463b621efa", "score": "0.7130803", "text": "func (n *Null) SetByte(addr uint16, value byte) error {\n\tif !n.Accepts(addr) {\n\t\treturn errors.E(fmt.Sprintf(\"address %v outside of space\", addr), errors.Mem)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bbf83988c08e1844563c10c5d946a542", "score": "0.7096426", "text": "func (m *Memory) PutByteAt(v byte, offset uint32) {\n\tm.bytes[offset] = v\n}", "title": "" }, { "docid": "7cfa87e6ec103263e526fc91d727d45d", "score": "0.6954837", "text": "func (mmu *MMU) WriteByte(addr, val int) {\n\t// Read the correct memory location\n\n\t// BIOS\n\tif addr >= 0x00 && addr <= 0xff {\n\t}\n\n\t// ROM Bank #0\n\tif addr < 0x4000 {\n\t}\n\n\t// Switchable ROM Bank\n\tif addr < 0x8000 {\n\t}\n\n\t// VRAM 8k\n\tif addr < 0xa000 {\n\t\tmmu.gpu.WriteByte(addr, val)\n\t}\n\n\t// Switch RAM bank 8k\n\tif addr < 0xc000 {\n\t\t//mmu.zram[addr] = val\n\t\tmmu.zram[addr%len(mmu.zram)] = val\n\t}\n\n\t// Internal RAM 8k\n\tif addr < 0xe000 {\n\t\tmmu.wram[addr%len(mmu.wram)] = val\n\t}\n\n\t// Echo RAM 8k\n\tif addr < 0xfe00 {\n\t\t// The addresses 0xe000 - 0xf000 appear to access the internal RAM the same as 0xc000 - 0xde00.\n\t\t// Writing a byte to 0xe000 will appear at 0xc000 and 0xe000 and vice-versa\n\t\tmmu.eram[addr%len(mmu.eram)] = val\n\t}\n\n\t// 0xfea0\n\n\t// 0xff00\n\n\t// 0xff4c\n\n\t// 0xff80\n\n\t// 0xffff\n}", "title": "" }, { "docid": "0a7147f321871ae3da10ffba2814495f", "score": "0.6896562", "text": "func (w *Writer) WriteByte(b byte) error {\n\toff := w.ensure(1)\n\tw.buf[off] = b\n\treturn nil\n}", "title": "" }, { "docid": "14a09da44c7e0278f3a6143ca3ad1a00", "score": "0.6894135", "text": "func WriteByte(c byte) error {\n\treturn nil\n}", "title": "" }, { "docid": "5600f45824eb842f554313f03c220dee", "score": "0.6857707", "text": "func (b *Buf) WriteByte(bt byte) {\n\tb.data[b.grow()] = bt // IS THIS HERE GUARANTEED TO WORK AS EXPECTED? Must b.grow be called first?\n}", "title": "" }, { "docid": "ea7d6a88b163e4c6988895babdb01024", "score": "0.6850954", "text": "func (b *WriteMem) WriteByte(c byte) error {\n\tif b.data == nil {\n\t\treturn ErrClosed\n\t}\n\tb.setSize(b.pos + 1)\n\t(*b.data)[b.pos] = c\n\tb.pos++\n\treturn nil\n}", "title": "" }, { "docid": "1c31f89f380e3590ce50dd730ea1cb72", "score": "0.6837079", "text": "func (buffer *Buffer) WriteByte(c byte) error {\n\tif buffer.Full() {\n\t\treturn fmt.Errorf(\"buffer is full\")\n\t}\n\n\tbuffer.value[buffer.cursor] = c\n\tshiftCursor(buffer, &buffer.cursor)\n\tbuffer.length++\n\n\treturn nil\n}", "title": "" }, { "docid": "e635cb3708fdde4dc95a55747d442150", "score": "0.67445785", "text": "func (b *Buffer) WriteByte(v byte) {\n\t(*b.buf)[b.offset] = v\n\tb.offset++\n}", "title": "" }, { "docid": "6ace2ea9279b3dc9ad163935f3307d1b", "score": "0.67099226", "text": "func (w *ByteWriter) WriteByte(c byte) error {\n\tp := w.grow(1)\n\tw.buf[p] = c\n\treturn nil\n}", "title": "" }, { "docid": "8457ec629990bf2e453dc6ea190cc478", "score": "0.66904986", "text": "func (b *Bitmap) SetByte(index int, v byte) error {\n\tif index > len(b.Data)-1 || index < 0 {\n\t\treturn errors.Errorf(\"SetByte\", \"index out of range: %d\", index)\n\t}\n\n\tb.Data[index] = v\n\treturn nil\n}", "title": "" }, { "docid": "8943260e8a4c3e2a6b1a952fac1a2390", "score": "0.66869193", "text": "func (c *Caret) WriteByte(x byte) error {\n\tc.tmp[0] = x\n\treturn c.write(c.tmp[:1], \"\")\n}", "title": "" }, { "docid": "b569de8f5265c793301cc6e5b88ae623", "score": "0.65791893", "text": "func (b *Buffer) WriteByte(bt byte) error {\n\tb.ba = append(b.ba, bt)\n\treturn nil\n}", "title": "" }, { "docid": "ae1ac4157ab55c5daab7b068b79a6712", "score": "0.65554726", "text": "func (b *Builder) WriteByte(c byte) error {\n\tb.copyCheck()\n\tb.buf = append(b.buf, c)\n\treturn nil\n}", "title": "" }, { "docid": "5e613abaca9646983f8cce3fad046823", "score": "0.6539613", "text": "func (p *GamePacket) WriteByte(b byte) {\n\tp.Data[p.Index] = b\n\tp.Advance(1)\n}", "title": "" }, { "docid": "95866a3e949bb42e4c9c4054ad17f4ca", "score": "0.6530327", "text": "func (b *Buffer) WriteByte(c byte) error {\n\tif b.full() {\n\t\treturn fmt.Errorf(\"cannot write to a full buffer\")\n\t}\n\tb.content = append(b.content, c)\n\treturn nil\n}", "title": "" }, { "docid": "067dfa2fed355a2a9a8a50bbd5bc73da", "score": "0.65119416", "text": "func (ew *EncodingWriter) WriteByte(v byte) error {\n\tew.Scratch[0] = v\n\treturn ew.Write(ew.Scratch[0:1])\n}", "title": "" }, { "docid": "d2262a9d56226336ed2ea4e79ecd8b16", "score": "0.64759994", "text": "func (d *Driver) WriteByte(b byte) (err error) {\n\td.txn = 1\n\td.txdone.Clear()\n\td.p.Task(STARTTX).Trig()\n\td.p.StoreTXD(b)\n\td.p.Event(TXDRDY).EnableIRQ()\n\tif !d.txdone.Sleep(d.timeoutTx) {\n\t\terr = ErrTimeout\n\t}\n\td.p.Task(STOPTX).Trig()\n\td.p.Event(TXDRDY).DisableIRQ()\n\td.p.Event(TXDRDY).Clear()\n\treturn // BUG: in case of timeout the ISR can still run in multicore system\n}", "title": "" }, { "docid": "2024bdaa29c44f793bd2205a3980b75d", "score": "0.6432501", "text": "func (w *writer) StoreByte(b byte) {\n\tif w.err != nil {\n\t\treturn\n\t}\n\n\tw.buf = append(w.buf, b)\n}", "title": "" }, { "docid": "e9a5b08603aacb7b34b7af27b5201d36", "score": "0.64216125", "text": "func (w *Writer) WriteByte(v byte) error {\n\t_ = w.buf.WriteByte(v)\n\treturn nil\n}", "title": "" }, { "docid": "8fc07973ef53a0f1f9c5a1d6eede309f", "score": "0.6421053", "text": "func (e *Buffer) WriteByte(b byte) error {\n\treturn e.buf.WriteByte(b)\n}", "title": "" }, { "docid": "4418eb452d20cca2136943454b6f08ee", "score": "0.63434166", "text": "func (rb *Buffer) WriteByte(c byte) error {\n\tif rb.Available() < 1 {\n\t\trb.grow(1)\n\t}\n\trb.buf[rb.w] = c\n\trb.w++\n\n\tif rb.w == rb.size {\n\t\trb.w = 0\n\t}\n\trb.isEmpty = false\n\n\treturn nil\n}", "title": "" }, { "docid": "dac3ffceb784445af8d87cc49e96ac06", "score": "0.6330746", "text": "func (r *RingBuffer) WriteByte(c byte) error {\n\tif r.Free() < 1 {\n\t\tr.makeSpace(1)\n\t}\n\n\tr.buf[r.w] = c\n\tr.w++\n\n\tif r.w == r.size {\n\t\tr.w = 0\n\t}\n\n\tr.isEmpty = false\n\n\treturn nil\n}", "title": "" }, { "docid": "f3a697ad7a5e06b25b1ed1231ab43d71", "score": "0.626744", "text": "func (b *Buffer) WriteByte(c byte) error {\n\tl := len(b.data)\n\tif b.size >= l {\n\t\treturn errors.New(\"Buffer full\")\n\t}\n\tb.data[b.write] = c\n\tb.write = (b.write + 1) % l\n\tb.size++\n\treturn nil\n}", "title": "" }, { "docid": "7d19e8f3b0b23e1ddce4b77734313c89", "score": "0.6236504", "text": "func WriteByte(w io.Writer, b byte) error {\n\tif w, ok := w.(io.ByteWriter); ok {\n\t\treturn w.WriteByte(b)\n\t}\n\t_, err := w.Write([]byte{b})\n\treturn err\n}", "title": "" }, { "docid": "07505b406b3f51ae9f937db2b7fe6817", "score": "0.6228915", "text": "func (e *Encoder) writeByte(b byte) {\n\te.buf = append(e.buf, b)\n}", "title": "" }, { "docid": "b672b25e4d5fe59023b8d8d49fff737a", "score": "0.6178317", "text": "func (w *packetWriter) WriteByte(b byte) {\n\tif w.err != nil {\n\t\treturn\n\t}\n\n\terr := w.wb.WriteByte(b)\n\tif err != nil {\n\t\tw.err = NewOpError(err,\n\t\t\tfmt.Sprintf(\"packetWriter.WriteByte writes: %x\", b))\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "ad91180e189fcdf86ac80721ec99c446", "score": "0.61688346", "text": "func (b *Buffer) AppendByte(bt byte) {\n\tb.ba = append(b.ba, bt)\n}", "title": "" }, { "docid": "4db593a3ef078d9ee7719f6bffcca741", "score": "0.6164026", "text": "func (s *SQLBuilder) WriteByte(b byte) {\n\ts.write([]byte{b})\n}", "title": "" }, { "docid": "b9df8599a3cbe43f8e90fc66b6f85bae", "score": "0.6151694", "text": "func (brw ByteReadWriter) WriteByte(b byte) error {\n\t_, err := brw.ReadWriter.Write([]byte{b})\n\treturn err\n}", "title": "" }, { "docid": "d97ab8d58c0c5f6bc587dc1a9e67f794", "score": "0.61437666", "text": "func (obj *ByteAttribute) SetByte(b uint8) {\n\tif !obj.IsNull() {\n\t\treturn\n\t}\n\tobj.AttrValue = b\n\tobj.setIsModified(true)\n}", "title": "" }, { "docid": "24c37386ba3c469b9b8258d20830fafc", "score": "0.6048625", "text": "func (b *Buffer) AppendByte(data byte) {\n\tif cap(b.Buf) == len(b.Buf) { // EnsureSpace won't be inlined.\n\t\tb.EnsureSpace(1)\n\t}\n\tb.Buf = append(b.Buf, data)\n}", "title": "" }, { "docid": "3aae4e285b404fa15130563d078ff3b2", "score": "0.6046789", "text": "func (uart *UART) writeByte(c byte) error {\n\t// wait until buffer is not full\n\tfor uart.Bus.UARTFR.HasBits(rp.UART0_UARTFR_TXFF) {\n\t\tgosched()\n\t}\n\n\t// write data\n\tuart.Bus.UARTDR.Set(uint32(c))\n\treturn nil\n}", "title": "" }, { "docid": "f1853b26543e99183c54833a3c535393", "score": "0.60153025", "text": "func (kf *Keyfarer) PutByteValue(value []byte) error {\n\tbf := func(b *bolt.Bucket) error {\n\t\treturn b.Put(kf.key, value)\n\t}\n\treturn kf.bb.Update(bf)\n}", "title": "" }, { "docid": "95ead3941c686cc2b10f8a808788ea45", "score": "0.6000529", "text": "func (p *mqttPacket) writeByte(b uint8) error {\n\tif p.pos+1 > p.length {\n\t\treturn mqttErrorInvalidProtocol\n\t}\n\tp.payload[p.pos] = b\n\tp.pos++\n\treturn nil\n}", "title": "" }, { "docid": "60b948cefce48b96e10899e2e0597717", "score": "0.5988691", "text": "func (usbcdc USBCDC) WriteByte(c byte) error {\n\t// Supposedly to handle problem with Windows USB serial ports?\n\tif usbLineInfo.lineState > 0 {\n\t\t// set the data\n\t\tudd_ep_in_cache_buffer[usb_CDC_ENDPOINT_IN][0] = c\n\n\t\tusbEndpointDescriptors[usb_CDC_ENDPOINT_IN].DeviceDescBank[1].ADDR.Set(uint32(uintptr(unsafe.Pointer(&udd_ep_in_cache_buffer[usb_CDC_ENDPOINT_IN]))))\n\n\t\t// clean multi packet size of bytes already sent\n\t\tusbEndpointDescriptors[usb_CDC_ENDPOINT_IN].DeviceDescBank[1].PCKSIZE.ClearBits(usb_DEVICE_PCKSIZE_MULTI_PACKET_SIZE_Mask << usb_DEVICE_PCKSIZE_MULTI_PACKET_SIZE_Pos)\n\n\t\t// set count of bytes to be sent\n\t\tusbEndpointDescriptors[usb_CDC_ENDPOINT_IN].DeviceDescBank[1].PCKSIZE.SetBits((1 & usb_DEVICE_PCKSIZE_BYTE_COUNT_Mask) << usb_DEVICE_PCKSIZE_BYTE_COUNT_Pos)\n\n\t\t// clear transfer complete flag\n\t\tsetEPINTFLAG(usb_CDC_ENDPOINT_IN, sam.USB_DEVICE_ENDPOINT_EPINTFLAG_TRCPT1)\n\n\t\t// send data by setting bank ready\n\t\tsetEPSTATUSSET(usb_CDC_ENDPOINT_IN, sam.USB_DEVICE_ENDPOINT_EPSTATUSSET_BK1RDY)\n\n\t\t// wait for transfer to complete\n\t\ttimeout := 3000\n\t\tfor (getEPINTFLAG(usb_CDC_ENDPOINT_IN) & sam.USB_DEVICE_ENDPOINT_EPINTFLAG_TRCPT1) == 0 {\n\t\t\ttimeout--\n\t\t\tif timeout == 0 {\n\t\t\t\treturn errors.New(\"USBCDC write byte timeout\")\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "6c2826d0732c1e4fa0bcf4bbde2b167a", "score": "0.59766394", "text": "func (uart UART) WriteByte(c byte) error {\n\t// wait until ready to receive\n\tfor !uart.Bus.INTFLAG.HasBits(sam.SERCOM_USART_INT_INTFLAG_DRE) {\n\t}\n\tuart.Bus.DATA.Set(uint32(c))\n\treturn nil\n}", "title": "" }, { "docid": "4ac30fdf0b95a2b2afd6ffe1fdaa8824", "score": "0.5949706", "text": "func (b *ByteBuf) WriteByte(v byte) error {\r\n\tb.Grow(1)\r\n\tb.buf[b.writerIndex] = v\r\n\tb.writerIndex++\r\n\treturn nil\r\n}", "title": "" }, { "docid": "13d1e6cab6c199056e56d16be7cf648e", "score": "0.5940596", "text": "func (r *relay) sendByte(data byte) error {\n\tif err := r.sockBuf.WriteByte(data); err != nil {\n\t\treturn permError(err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "8f64064fb62214b5f20500e8685de503", "score": "0.59251285", "text": "func (m *Memory) PutUint8(v byte, base, offset uint32) {\n\tm.bytes[effectiveAddress(base, offset)] = v\n}", "title": "" }, { "docid": "f5f933812ed9e5bdafb1dfd1b40d15ca", "score": "0.59147274", "text": "func (w *ResponseWriter) AppendByte(b byte) {\n\tif buf := w.Alloc(1); buf != nil {\n\t\tbuf[0] = b\n\t}\n}", "title": "" }, { "docid": "17800be0bc18b892c4cdfeee03001412", "score": "0.5866397", "text": "func (o *FormatTest) SetByte(v string) {\n\to.Byte = v\n}", "title": "" }, { "docid": "cfcb01efe02b9bd9125403887bcad936", "score": "0.58287203", "text": "func (m *Memory) PutUint8(v byte, base, offset uint32) {\n\tp := (*byte)(unsafe.Pointer(m.start + uintptr(base) + uintptr(offset)))\n\t*p = v\n}", "title": "" }, { "docid": "76efde10596415b7b2f4daf047344cf5", "score": "0.58238107", "text": "func (bw *BitWriter) EmitByte(byte_ int) {\n if (bw.pos < bw.length) {\n bw.data[bw.pos] = byte(byte_);\n bw.pos++\n } else {\n bw.overflow = true;\n }\n if (byte_ == 0xff) {\n bw.EmitByte(0);\n }\n }", "title": "" }, { "docid": "d5e619fffa37cafcb38fa2914e5bbcb8", "score": "0.5731256", "text": "func (mp *mappedPage) PutUint8(value uint8, offset int) {\n\tmp.mappedBytes[offset] = value\n}", "title": "" }, { "docid": "90e07dc1138e5a9501590ac0352a5066", "score": "0.57138073", "text": "func (e *Encoder) Byte(b byte) { // WriteB as sig differs from WriteByte (vet issues)\n\te.b[0] = b\n\te.Bytes(e.b[:1])\n}", "title": "" }, { "docid": "409b562f8eed706751cfcf7bcd51e0cf", "score": "0.56838226", "text": "func (l *Lcd) writeByte(ch byte) {\n\tbitArr := byteToBitArray(ch)\n\tl.D4.SetLow()\n\tl.D5.SetLow()\n\tl.D6.SetLow()\n\tl.D7.SetLow()\n\tl.writeBits(bitArr, HIGH_BITS)\n\tl.enable()\n\tl.writeBits(bitArr, LOW_BITS)\n\tl.enable()\n\t//time.Sleep(1 * time.Nanosecond)\n}", "title": "" }, { "docid": "c9d4b9f1453435de6ca8e44f9219aacf", "score": "0.5655765", "text": "func PutUint8(b []byte, v uint8) {\n\tif l := len(b); l != 1 {\n\t\tpanic(fmt.Sprintf(\"PutUint8: unexpected byte slice length: %d\", l))\n\t}\n\n\tb[0] = v\n}", "title": "" }, { "docid": "148ae61941f6d5cef250fa3b0ad9692b", "score": "0.56268585", "text": "func (o *Out) PutUInt8(x uint8) {\n\to.writeUnsafe(x)\n}", "title": "" }, { "docid": "798f824a5ef13647501b074068b0ee6a", "score": "0.55919605", "text": "func (b *Byte) Set(v byte) {\n\tb.value = &v\n}", "title": "" }, { "docid": "f6d3ab966bf1c2e9b422904a36f43617", "score": "0.5508131", "text": "func (i2c I2C) WriteByte(data byte) error {\n\t// Send data byte\n\ti2c.Bus.DATA.Set(data)\n\n\t// wait until transmission successful\n\ttimeout := i2cTimeout\n\tfor !i2c.Bus.INTFLAG.HasBits(sam.SERCOM_I2CM_INTFLAG_MB) {\n\t\t// check for bus error\n\t\tif i2c.Bus.STATUS.HasBits(sam.SERCOM_I2CM_STATUS_BUSERR) {\n\t\t\treturn errors.New(\"I2C bus error\")\n\t\t}\n\t\ttimeout--\n\t\tif timeout == 0 {\n\t\t\treturn errors.New(\"I2C timeout on write data\")\n\t\t}\n\t}\n\n\tif i2c.Bus.STATUS.HasBits(sam.SERCOM_I2CM_STATUS_RXNACK) {\n\t\treturn errors.New(\"I2C write error: expected ACK not NACK\")\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "54561bfa205d5d431fec34c327894258", "score": "0.54997915", "text": "func (m *Memory) PutUint8At(v byte, offset uint32) {\n\tp := (*byte)(unsafe.Pointer(m.start + uintptr(offset)))\n\t*p = v\n}", "title": "" }, { "docid": "55eaa6f3b69fe6e2af4d66a3cb209ca8", "score": "0.5453418", "text": "func (la *LineArray) insertByte(pos Loc, value byte) {\n\tla.lines[pos.Y].data = append(la.lines[pos.Y].data, 0)\n\tcopy(la.lines[pos.Y].data[pos.X+1:], la.lines[pos.Y].data[pos.X:])\n\tla.lines[pos.Y].data[pos.X] = value\n}", "title": "" }, { "docid": "00fecb8b9b932eadf11bc0492e188bb0", "score": "0.54416203", "text": "func (r *BuildReader) WriteByte(b byte) error {\n\tif r.i <= -1 {\n\t\tr.i = 0\n\t}\n\treturn r.builder.WriteByte(b)\n}", "title": "" }, { "docid": "7f703d6581bd773ec5c73bcf1fc7afbf", "score": "0.5418022", "text": "func (b *encbuf) WriteOneByte(c byte) {\n\tb.tryReserve(1)\n\tb.buf[b.end] = c\n\tb.end++\n}", "title": "" }, { "docid": "73312404229503b4e7cbae49731414fc", "score": "0.53849554", "text": "func (m *Memory) PutUint8At(v byte, offset uint32) {\n\tm.bytes[offset] = v\n}", "title": "" }, { "docid": "e40f6ea18141952b81f18f85df17347e", "score": "0.5366225", "text": "func (p *Packer) PushByte(b byte) *Packer {\n\treturn p.errFilter(func() {\n\t\t_, p.err = p.buffer.Write([]byte{b})\n\t})\n}", "title": "" }, { "docid": "751e3dd95467e3f2d3af0508eea7bab9", "score": "0.53566736", "text": "func (w *Writer) WriteRawByte(b byte) (offset uint64, err error) {\n\tcurrentOffset := w.w.Count()\n\terr = w.w.WriteByte(b)\n\tw.checksum = crc32.Update(w.checksum, crc32.IEEETable, []byte{b})\n\treturn currentOffset, err\n}", "title": "" }, { "docid": "4f7da2219cf589aaec37d2a8e857e3f3", "score": "0.5325225", "text": "func UpdateByte(packet []byte, position int, v byte) {\n\told := packet[position]\n\tif old == v {\n\t\treturn\n\t}\n\n\tvar before, after uint16\n\tif position&1 == 0 {\n\t\tbefore = binary.LittleEndian.Uint16(packet[position:])\n\t\tpacket[position] = v\n\t\tafter = binary.LittleEndian.Uint16(packet[position:])\n\t} else {\n\t\tbefore = binary.LittleEndian.Uint16(packet[position-1:])\n\t\tpacket[position] = v\n\t\tafter = binary.LittleEndian.Uint16(packet[position-1:])\n\t}\n\n\tsum := uint32(^binary.LittleEndian.Uint16(packet[IPv4ChecksumOffset:]))\n\tsum += uint32(^before)\n\tsum += uint32(after)\n\tsum = sum&0xffff + sum>>16\n\tbinary.LittleEndian.PutUint16(packet[IPv4ChecksumOffset:], uint16(^sum))\n}", "title": "" }, { "docid": "742723f296c5dd7e42fb2c83f9b8ce68", "score": "0.5300435", "text": "func (e *byteEncoder) PutInt8(in int8) {\n\te.b[e.off] = byte(in)\n\te.off++\n}", "title": "" }, { "docid": "8bff8cd36c60d371cd73803f547361e8", "score": "0.5268437", "text": "func (r RAM) Write(addr uint16, value uint8) {\n\tr.bytes[addr-r.start] = value\n}", "title": "" }, { "docid": "5528c7db9b67fbbd867ecaa907b1cc9b", "score": "0.5268374", "text": "func (m *Memory) Byte(base, offset uint32) byte {\n\treturn m.bytes[effectiveAddress(base, offset)]\n}", "title": "" }, { "docid": "7e918026143045b3c066a0b9411fbd44", "score": "0.52439123", "text": "func (d *Encoded) put1byte(startPos byte, v int8) {\n\td[startPos] = byte(v)\n}", "title": "" }, { "docid": "18e14378f38da5833d2351943d9d6cf8", "score": "0.5190823", "text": "func (n *Null) GetByte(addr uint16) (byte, error) {\n\tif !n.Accepts(addr) {\n\t\treturn 0, errors.E(fmt.Sprintf(\"address %v outside of space\", addr), errors.Mem)\n\t}\n\treturn 0, nil\n}", "title": "" }, { "docid": "c77e03fe0c20b44a9171ad6ac8f23116", "score": "0.51703876", "text": "func (o *Out) PutInt8(x int8) {\n\to.writeUnsafe(x)\n}", "title": "" }, { "docid": "a579a63755a84972cfd0e828ce048563", "score": "0.51584524", "text": "func (q *Query) AppendByte(c byte) {\n\tq.stmt = append(q.stmt, c)\n}", "title": "" }, { "docid": "894c59f0e3b522fa1a56f030ed08e5c6", "score": "0.51416445", "text": "func (w *TextSerializationWriter) WriteByteValue(key string, value *byte) error {\n\tif value != nil {\n\t\tcast := int64(*value)\n\t\treturn w.WriteInt64Value(key, &cast)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "bb515a94c729af6e23d721f0d8922eeb", "score": "0.51291406", "text": "func Writeu8(baseAddress int64, offset uint16, value uint8) {\n\tconst bufferSize int = 4096\n\tfile, err := os.OpenFile(\"/dev/mem\", os.O_RDWR, 0666)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\tdefer file.Close()\n\tmmap, err := syscall.Mmap(int(file.Fd()), baseAddress, bufferSize, syscall.PROT_WRITE, syscall.MAP_SHARED)\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\t*(*uint8)(unsafe.Pointer(&mmap[offset])) = value\n\terr = syscall.Munmap(mmap)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n}", "title": "" }, { "docid": "a889060e02dbe068e67572913c44f76e", "score": "0.5116769", "text": "func (d *Encoded) PutArgUint8(v uint8) (argIdx int) {\n\n\tstartPos := d.argReserveForType(cArgTypeUint8)\n\tif startPos == cPosErr {\n\t\treturn cBadIndex\n\t}\n\n\td.put1byte(startPos, int8(v))\n\treturn d.argCountIncPostfix()\n}", "title": "" }, { "docid": "4d8ca1909867c08eb4d49ed6ec058bc4", "score": "0.51025325", "text": "func WriterWriteByte(b *bufio.Writer, c byte) error", "title": "" }, { "docid": "f3a337bb731e15e2b6c9b051c94db91a", "score": "0.50847065", "text": "func (mmu *MMU) WriteWord(addr, val int) {\n\tmmu.WriteByte(addr, val&255)\n\tmmu.WriteByte(addr+1, val>>8)\n}", "title": "" }, { "docid": "e959d9fb1a898427b4ffc47d7809113e", "score": "0.5067127", "text": "func (doc *Document) SetByte(fieldPath string, value []byte) *Document {\n\tif arrRgx.MatchString(fieldPath) {\n\t\tdoc.setArrayValue(fieldPath, value)\n\t} else {\n\t\tdoc.documentMap = mergeMaps(doc.documentMap, doc.newValue(fieldPath, value)).(map[string]interface{})\n\t}\n\treturn doc\n}", "title": "" }, { "docid": "ac13728ae33cfac22aac0726c5e83688", "score": "0.5059468", "text": "func (p *Process) ReadByte(offset uintptr) (byte, error) {\n\tvar (\n\t\tvalue byte\n\t\tvaluePtr = (uintptr)(unsafe.Pointer(&value))\n\t)\n\n\terr := p.Read(offset, valuePtr, unsafe.Sizeof(value))\n\n\treturn value, err\n}", "title": "" }, { "docid": "92bd4bd0f0c517afbf58d11663dc86b3", "score": "0.505939", "text": "func ByteToPtr(b byte) *byte {\n\treturn &b\n}", "title": "" }, { "docid": "12853b0215d91bb90219c285b105c762", "score": "0.50569695", "text": "func (m *Memory) Byte(base, offset uint32) byte {\n\tp := (*byte)(unsafe.Pointer(m.start + uintptr(base) + uintptr(offset)))\n\treturn *p\n}", "title": "" }, { "docid": "b296d403276c3a5adda5c0af97b4979d", "score": "0.50445646", "text": "func (o *Out) PutRune(x rune) {\n\to.writeUnsafe(int32(x))\n}", "title": "" }, { "docid": "8e0f201a0d11c0faf9950331169865b8", "score": "0.502461", "text": "func (obj *ByteAttribute) WriteExternal(os tgdb.TGOutputStream) tgdb.TGError {\n\treturn AbstractAttributeWriteExternal(obj, os)\n}", "title": "" }, { "docid": "68e2bf05cf1a506e4768f20804dbeca5", "score": "0.50172794", "text": "func (p *Packet) PutUint(v uint32) {\n\tif v < (1 << 7) {\n\t\t*p = append(*p, byte(v))\n\t} else if v < (1 << 14) {\n\t\t*p = append(*p, (byte(v)&0x7F)|0x80, byte(v>>7))\n\t} else if v < (1 << 21) {\n\t\t*p = append(*p, (byte(v)&0x7F)|0x80, (byte(v>>7)&0x7F)|0x80, byte(v>>14))\n\t} else {\n\t\t*p = append(*p, (byte(v)&0x7F)|0x80, (byte(v>>7)&0x7F)|0x80, (byte(v>>14)&0x7F)|0x80, byte(v>>21))\n\t}\n}", "title": "" }, { "docid": "7eb81b2f4d7c4930fe814b03119ac3c6", "score": "0.5013184", "text": "func (Byte) WriteTo(writer io.Writer) (int64, error) {\n\n\treturn writeTo(writer, CodeByte)\n}", "title": "" }, { "docid": "6fb64ec73f1f21306ff8e1e452eb16ae", "score": "0.49977607", "text": "func (mmu *MMU) ReadByte(addr int) int {\n\t// Read the correct memory location\n\tcheck := addr & 0xf000\n\n\t// BIOS\n\tif addr <= 0xff {\n\t\treturn mmu.bios[addr]\n\t}\n\n\t// ROM Bank #0\n\tif check <= 0x4000 {\n\t\treturn int(mmu.rom[addr%len(mmu.rom)])\n\t}\n\n\t// Switchable ROM Bank\n\tif check <= 0x8000 {\n\t\treturn int(mmu.rom[addr%len(mmu.rom)])\n\t}\n\n\t// VRAM 8k\n\tif check <= 0xa000 {\n\t\treturn mmu.gpu.ReadByte(addr)\n\t}\n\n\t// Switch RAM bank 8k\n\tif check <= 0xc000 {\n\t\treturn mmu.zram[addr%len(mmu.zram)]\n\t}\n\n\t// Internal RAM 8k\n\tif check <= 0xe000 {\n\t\treturn mmu.wram[addr%len(mmu.wram)]\n\t}\n\n\t// Echo RAM 8k\n\tif check <= 0xfe00 {\n\t\t// The addresses 0xe000 - 0xf000 appear to access the internal RAM the same as 0xc000 - 0xde00.\n\t\t// Writing a byte to 0xe000 will appear at 0xc000 and 0xe000 and vice-versa\n\t\treturn mmu.eram[addr%len(mmu.eram)]\n\t}\n\n\t// 0xfea0\n\n\t// 0xff00\n\n\t// 0xff4c\n\n\t// 0xff80\n\n\t// 0xffff\n\n\treturn 0\n}", "title": "" }, { "docid": "f397df67bece6fb1eeacf58e834826d9", "score": "0.49933994", "text": "func (b *ByteStream) WriteBit(bit byte) {\n\tvar offset = b.length / 8\n\tvar offsetBit = b.length % 8\n\tb.length++\n\tif offset >= uint64(len(b.data)) {\n\t\tb.data = append(b.data, 0)\n\t}\n\tif bit == 1 {\n\t\tb.data[offset] = b.data[offset] | (1 << (offsetBit))\n\t} else {\n\t\tb.data[offset] = b.data[offset] & (^(1 << (offsetBit)))\n\t}\n\t//fmt.Println(\"write\",bit,\"at\",offset,\"+\",offsetBit,b)\n}", "title": "" }, { "docid": "f33954979d215dcbe1eae9d74fc81ee5", "score": "0.49542034", "text": "func (c *Client) SendByte(data []byte) *Resp {\n\treturn c.FSendByte(data).GetResp()\n}", "title": "" }, { "docid": "9fea623a0c91b1c359c30d29b82995d1", "score": "0.4916327", "text": "func (p *printingHandler) TestByte(ctx frugal.FContext, thing int8) (r int8, err error) {\n\treturn thing, nil\n}", "title": "" }, { "docid": "7c9e9f59780b0f6984d863f71256bfd8", "score": "0.48917952", "text": "func ActionStoreByte(b *byte) GetterAction {\n\treturn func(data interface{}, ur UnitReader) (error, bool) {\n\t\t*b = data.(byte)\n\t\treturn nil, false\n\t}\n}", "title": "" }, { "docid": "be63afcc8b1b75c0b9096636fdeecf3c", "score": "0.48894462", "text": "func (p *PreferencesImpl) GetByte(key string, defaultValue byte) byte {\n\tval, ok := p.GetObject(key, defaultValue).(byte)\n\tif !ok {\n\t\treturn defaultValue\n\t}\n\treturn val\n}", "title": "" }, { "docid": "4c2947f5a8c718c82c9a241ef69841e5", "score": "0.48640338", "text": "func Putchar(character int32) {\n\tfmt.Fprintf(os.Stdout, \"%c\", int(character))\n}", "title": "" }, { "docid": "a8d8fbefe4425f4a7a5934deb5addca1", "score": "0.48552132", "text": "func (e *Encoder) WriteSingleByte(b byte) {\n\te.Data = append(e.Data, b)\n}", "title": "" }, { "docid": "15d3ba7e911f46df053e36d1b545c653", "score": "0.48544887", "text": "func (w *writer) PutBytes(v []byte) {\n\t_, w.err = w.buf.Write(v)\n}", "title": "" }, { "docid": "8a3e39ff874a923a3a0f798208094b5f", "score": "0.48510545", "text": "func (d *Driver) WriteReadByte(b byte) byte {\n\tif d.err != 0 {\n\t\treturn 0\n\t}\n\td.done.Clear()\n\tp := d.p\n\tp.EditConfig(TwoWire|Tx, ThreeWire|TxRx)\n\tp.EnableIRQ(RxNotEmpty | Err)\n\tp.StoreByte(b)\n\tif !d.done.Sleep(d.timeout) {\n\t\tp.DisableIRQ(RxNotEmpty | Err)\n\t\td.err = uint32(ErrTimeout) << 16\n\t\treturn 0\n\t}\n\tb = p.LoadByte()\n\tif _, e := p.Status(); e != 0 {\n\t\td.err = uint32(e) << 8\n\t\treturn 0\n\t}\n\treturn b\n}", "title": "" }, { "docid": "2b9732a158b0167f4da6a4bdf6053108", "score": "0.4845321", "text": "func readByte(b *[]byte, off int64, length int, file *os.File) {\n\t// The byte array must have a fixed length\n\tdata := make([]byte, length, length)\n\t_, err := file.ReadAt(data, off)\n\tif err != nil {\n\t\tlog.Printf(\"error reading %d bytes from file %v at offset %d:%v\", length, file.Name(), off, err)\n\t\treturn\n\t}\n\n\t//log.Printf(\"% x \", data)\n\t*b = data\n}", "title": "" }, { "docid": "4d88057b21914040fbedc5adfd4fe569", "score": "0.48240367", "text": "func (b *Builder) AddByte(name string) *Builder {\n\tb.AddByteWithTag(name, \"\")\n\treturn b\n}", "title": "" }, { "docid": "30ae4f81635d03ae762f53838520b48b", "score": "0.4817445", "text": "func (cur *Cursor) SetUint(value uint) {\n\tcur.update.PutUint(commit.Put, cur.idx, value)\n}", "title": "" }, { "docid": "c66ee0230a75a8290850076579a21183", "score": "0.48076266", "text": "func (o *Out) PutBytes(x []byte) {\n\to.PutUInts8(x)\n}", "title": "" }, { "docid": "f11b985b43207b3cf82b354fad3a522c", "score": "0.4805999", "text": "func hashAddByte(h uint64, b byte) uint64 {\n\th ^= uint64(b)\n\th *= prime64\n\treturn h\n}", "title": "" } ]
dd7dae7d37b5b37c253068fd67bb8dd7
PatientHeightGTE applies the GTE predicate on the "Patient_height" field.
[ { "docid": "d85fddb8ea64bbf59466a087047ee0f8", "score": "0.8499357", "text": "func PatientHeightGTE(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" } ]
[ { "docid": "26b7a4447d324aefa70bfe9f3fa82415", "score": "0.84881526", "text": "func PatientHeightGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "c868c931c825272eff5bf1d325d4f0fb", "score": "0.7172676", "text": "func PatientHeightGT(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "2d370fc99f942c31246607e91d66b9c8", "score": "0.7054498", "text": "func PatientHeightGT(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "0dfebe9e516aeeb6de3fb6ca829b413b", "score": "0.6994576", "text": "func PatientAgeGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientAge), v))\n\t})\n}", "title": "" }, { "docid": "62787bd207a43f9f926d1d885b78c427", "score": "0.69166195", "text": "func PatientAgeGTE(v int) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientAge), v))\n\t})\n}", "title": "" }, { "docid": "83e82d254c15af68c05212c69ac3fcc9", "score": "0.6442999", "text": "func PatientHeightLTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "8fd437eb6bbcf2b959b880f3cb4c00c1", "score": "0.63183755", "text": "func PatientHeightLTE(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "e48c0cc42a4ee4ddac37682afe173a6e", "score": "0.6272472", "text": "func PatientHeight(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "d9c8828d7a808bd7d2cf1f9654dbc886", "score": "0.6266586", "text": "func PatientHeight(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "f97b341a262b319ca2a7fe92902570c0", "score": "0.62359554", "text": "func PatientWeightGTE(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientWeight), v))\n\t})\n}", "title": "" }, { "docid": "34b3eccc163e4cc2c352e87f4790c215", "score": "0.61956334", "text": "func PatientWeightGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientWeight), v))\n\t})\n}", "title": "" }, { "docid": "cf4b3d429251c012fb40e28d64d627d5", "score": "0.6168714", "text": "func PatientGenderGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientGender), v))\n\t})\n}", "title": "" }, { "docid": "1b7ee791dbeee7175a144ac1af807fa5", "score": "0.60614866", "text": "func PatientBloodGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientBlood), v))\n\t})\n}", "title": "" }, { "docid": "cb928ca47f6ad3100556e6397d09f943", "score": "0.59760666", "text": "func PatientAgeGT(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPatientAge), v))\n\t})\n}", "title": "" }, { "docid": "24e881c1dc536c8f36a0f3c2e4561c54", "score": "0.5958325", "text": "func PatientAgeGT(v int) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPatientAge), v))\n\t})\n}", "title": "" }, { "docid": "61f16e922145fb8d52dc6ed09bdd1d59", "score": "0.5921441", "text": "func RegisterAgeGTE(v int) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldRegisterAge), v))\n\t})\n}", "title": "" }, { "docid": "c741599c0fc416e2322c163b86c606b5", "score": "0.58217597", "text": "func PatientHeightEQ(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "8d0a357bc5a4d930b0dd7ad947c7f491", "score": "0.58102524", "text": "func PatientHeightEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.EQ(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "e63d72e979bb7b143d630d11566d5b78", "score": "0.55355126", "text": "func PatientGenderGT(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPatientGender), v))\n\t})\n}", "title": "" }, { "docid": "0133f30e33a05b609324023e3898fa6e", "score": "0.5528078", "text": "func NumbtenantGTE(v string) predicate.Lease {\n\treturn predicate.Lease(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldNumbtenant), v))\n\t})\n}", "title": "" }, { "docid": "4d084b2a6fc6fe44e84915a043183805", "score": "0.54594857", "text": "func PatientHeightContains(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.Contains(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "e7b8af6a82285a61f331d7a94a0faf76", "score": "0.54544693", "text": "func (m *PatientMutation) PatientHeight() (r string, exists bool) {\n\tv := m._Patient_Height\n\tif v == nil {\n\t\treturn\n\t}\n\treturn *v, true\n}", "title": "" }, { "docid": "4ce37a8ff6d2ff1160e603dcd58644c3", "score": "0.54391026", "text": "func PatientBloodGT(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPatientBlood), v))\n\t})\n}", "title": "" }, { "docid": "5ddec098f99b86efe80edbc9c8f9cbac", "score": "0.54210013", "text": "func RegisterHightGTE(v int) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldRegisterHight), v))\n\t})\n}", "title": "" }, { "docid": "e1b751199166f407f108b2ed416e1035", "score": "0.5315824", "text": "func HnGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldHn), v))\n\t})\n}", "title": "" }, { "docid": "2c225bf3bb2d09954d54a6f270c29a15", "score": "0.5289758", "text": "func StrengthGTE(v int) predicate.Drug {\n\treturn predicate.Drug(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldStrength), v))\n\t})\n}", "title": "" }, { "docid": "f789fb52c65256e14329674dca5ee5bc", "score": "0.5266084", "text": "func IdtenantGT(v string) predicate.Lease {\n\treturn predicate.Lease(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldIdtenant), v))\n\t})\n}", "title": "" }, { "docid": "b5a53f5df54d676abde7def02fcec506", "score": "0.52393806", "text": "func BirthdayGTE(v time.Time) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldBirthday), v))\n\t})\n}", "title": "" }, { "docid": "294101c4e963af15f62a6b30691c34ad", "score": "0.52101016", "text": "func PatientWeightGT(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPatientWeight), v))\n\t})\n}", "title": "" }, { "docid": "5041271c667ebd7be5bc581fc824b664", "score": "0.5206408", "text": "func RegisterAgeGT(v int) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldRegisterAge), v))\n\t})\n}", "title": "" }, { "docid": "f8108a00dd173b1c9d655bbebda03581", "score": "0.519731", "text": "func AgetenantGT(v int) predicate.Lease {\n\treturn predicate.Lease(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldAgetenant), v))\n\t})\n}", "title": "" }, { "docid": "2bfb9b9d18b8b8311ec9c824d3b643da", "score": "0.5186511", "text": "func PatientHeightContainsFold(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.ContainsFold(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "555e2c74d7ae7a9f17f74f8ae34dc479", "score": "0.5172533", "text": "func PatientWeightGT(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPatientWeight), v))\n\t})\n}", "title": "" }, { "docid": "7db4bb9b13ef8ef86c4e794bc00ca6ec", "score": "0.51498324", "text": "func (m *PatientMutation) SetPatientHeight(s string) {\n\tm._Patient_Height = &s\n}", "title": "" }, { "docid": "4db0bdf1632f68fc2c8f8cbed451c2c1", "score": "0.5146296", "text": "func AgetenantGTE(v int) predicate.Lease {\n\treturn predicate.Lease(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldAgetenant), v))\n\t})\n}", "title": "" }, { "docid": "2c463939c4ae0780b55007695fb6066f", "score": "0.51359934", "text": "func (m *PatientMutation) OldPatientHeight(ctx context.Context) (v string, err error) {\n\tif !m.op.Is(OpUpdateOne) {\n\t\treturn v, fmt.Errorf(\"OldPatientHeight is allowed only on UpdateOne operations\")\n\t}\n\tif m.id == nil || m.oldValue == nil {\n\t\treturn v, fmt.Errorf(\"OldPatientHeight requires an ID field in the mutation\")\n\t}\n\toldValue, err := m.oldValue(ctx)\n\tif err != nil {\n\t\treturn v, fmt.Errorf(\"querying old value for OldPatientHeight: %w\", err)\n\t}\n\treturn oldValue.PatientHeight, nil\n}", "title": "" }, { "docid": "950f12eca9b10a1df419dba5872d4d45", "score": "0.5127802", "text": "func RegisterBirthdayGTE(v time.Time) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldRegisterBirthday), v))\n\t})\n}", "title": "" }, { "docid": "47dbd409283a62d99848b1f3f0456945", "score": "0.51226866", "text": "func DurationGTE(v *pgtype.Tstzrange) predicate.UserStatus {\n\treturn predicate.UserStatus(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldDuration), v))\n\t})\n}", "title": "" }, { "docid": "efcb9c9902635565150e3652ea94056d", "score": "0.5121305", "text": "func MemoryGTE(v string) predicate.InstanceRuntime {\n\treturn predicate.InstanceRuntime(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldMemory), v))\n\t})\n}", "title": "" }, { "docid": "899e620bb9120998fa17a720ab4e3173", "score": "0.5118402", "text": "func PatientHeightLT(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.LT(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "fcc342ea84fa379577d540355f1e764d", "score": "0.50891584", "text": "func PatientGenderLTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldPatientGender), v))\n\t})\n}", "title": "" }, { "docid": "48a6c8c22a13941f0a08f4c95b6a02fa", "score": "0.50871634", "text": "func IdtenantGTE(v string) predicate.Lease {\n\treturn predicate.Lease(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldIdtenant), v))\n\t})\n}", "title": "" }, { "docid": "f3f59de33a6a9fde2ec349e3871f4d9f", "score": "0.50478226", "text": "func NumbtenantGT(v string) predicate.Lease {\n\treturn predicate.Lease(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldNumbtenant), v))\n\t})\n}", "title": "" }, { "docid": "10ee8eaabe5a8a6d3aec5598fc02589c", "score": "0.5030092", "text": "func PatientAgeLTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldPatientAge), v))\n\t})\n}", "title": "" }, { "docid": "ab7db869881cdc4e0e5d6f63ab8b3ce9", "score": "0.5029241", "text": "func PatientHeightNotIn(vs ...float64) predicate.Patient {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.NotIn(s.C(FieldPatientHeight), v...))\n\t})\n}", "title": "" }, { "docid": "047e7c1a326b8ecc584d96ed8c21543c", "score": "0.49791294", "text": "func PatientHeightNEQ(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "1aa453a4d4ed5fae3a5ea2f595368bc8", "score": "0.49504498", "text": "func RegisterPatientIDGTE(v string) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldRegisterPatientID), v))\n\t})\n}", "title": "" }, { "docid": "1ce0a619c3b508b67e3e39bb6ec4cb0e", "score": "0.49403936", "text": "func PatientHeightLT(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.LT(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "039ea6734b43bf20d3ae060f6a305e04", "score": "0.4939032", "text": "func TenantGTE(v string) predicate.Lease {\n\treturn predicate.Lease(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldTenant), v))\n\t})\n}", "title": "" }, { "docid": "71c259b60dd664f73253f84ce4e9277a", "score": "0.49320117", "text": "func PatientAgeLTE(v int) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.LTE(s.C(FieldPatientAge), v))\n\t})\n}", "title": "" }, { "docid": "f74d82369030768dac17da300148081e", "score": "0.49316478", "text": "func PatientHeightNEQ(v float64) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.NEQ(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "5d6df7cdbd71f1b7fdfff7a4430690af", "score": "0.49314573", "text": "func ValueGTE(v float64) predicate.K8sMetric {\n\treturn predicate.K8sMetric(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldValue), v))\n\t})\n}", "title": "" }, { "docid": "ade19d2983a83166e87d1b68c7ef65b3", "score": "0.49284327", "text": "func BirthdayDateGTE(v time.Time) predicate.Employee {\n\treturn predicate.Employee(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldBirthdayDate), v))\n\t})\n}", "title": "" }, { "docid": "745948dea1ad27786865ad63b9198731", "score": "0.49183702", "text": "func PatientHeightEqualFold(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.EqualFold(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "deb26557ad63be71ea0e23fe9aa1f754", "score": "0.4905174", "text": "func BaselinePopulationDescriptionGTE(v string) predicate.BaselineCharacteristicsModule {\n\treturn predicate.BaselineCharacteristicsModule(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldBaselinePopulationDescription), v))\n\t})\n}", "title": "" }, { "docid": "3d1d380484775266ddfb033786f1f941", "score": "0.48975572", "text": "func PatientHeightHasSuffix(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.HasSuffix(s.C(FieldPatientHeight), v))\n\t})\n}", "title": "" }, { "docid": "78dd36ee373c4a1a868d922d11af2385", "score": "0.48930156", "text": "func PasswordGTE(v string) predicate.Employee {\n\treturn predicate.Employee(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPassword), v))\n\t})\n}", "title": "" }, { "docid": "334218747833b145ad25f2e623d1d40c", "score": "0.48829243", "text": "func InformationGTE(v string) predicate.Drug {\n\treturn predicate.Drug(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldInformation), v))\n\t})\n}", "title": "" }, { "docid": "bf679239c642db068899f1e638c293a5", "score": "0.48598656", "text": "func TemplateGTE(v string) predicate.Template {\n\treturn predicate.Template(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldTemplate), v))\n\t})\n}", "title": "" }, { "docid": "b51c5df65e9f2c83b181ea477884f410", "score": "0.4846085", "text": "func PatientHeightNotIn(vs ...string) predicate.Patient {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.NotIn(s.C(FieldPatientHeight), v...))\n\t})\n}", "title": "" }, { "docid": "b840170795398d187ca2e89b79870658", "score": "0.48446137", "text": "func RegisterHightGT(v int) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldRegisterHight), v))\n\t})\n}", "title": "" }, { "docid": "6e29afd3be9df27b6bc4d3573d53e4b2", "score": "0.48407775", "text": "func PidGTE(v uint64) predicate.District {\n\treturn predicate.District(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPid), v))\n\t})\n}", "title": "" }, { "docid": "7f0feb21cb18c4f03432bb5f90783b8a", "score": "0.484027", "text": "func RegisterWeightGTE(v int) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldRegisterWeight), v))\n\t})\n}", "title": "" }, { "docid": "62ae9313f8a009a4ba4bdb6cb9617aaf", "score": "0.48394853", "text": "func TagGTE(v string) predicate.Tag {\n\treturn predicate.Tag(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldTag), v))\n\t})\n}", "title": "" }, { "docid": "db691d5d93811a344394764a46ff6e5f", "score": "0.48386917", "text": "func Gt(values ...Measurement) filter.Filter { return condition(\"gt\", values...) }", "title": "" }, { "docid": "745cdc5dc6327e7107bff734ce49e112", "score": "0.48381504", "text": "func PasswordGT(v string) predicate.Employee {\n\treturn predicate.Employee(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldPassword), v))\n\t})\n}", "title": "" }, { "docid": "ba706fd868b3f47673075cd387b6127e", "score": "0.48260644", "text": "func MaxDurationGTE(v int) predicate.DNSDetectorResult {\n\treturn predicate.DNSDetectorResult(sql.FieldGTE(FieldMaxDuration, v))\n}", "title": "" }, { "docid": "dfa65ca374b18eed3a554678f0b682f1", "score": "0.4802717", "text": "func ExpGTE(v uint64) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldExp), v))\n\t})\n}", "title": "" }, { "docid": "39bbe793ab39e4423e5a6f22017fcf9a", "score": "0.4801608", "text": "func DataGTE(v string) predicate.InstanceRuntime {\n\treturn predicate.InstanceRuntime(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldData), v))\n\t})\n}", "title": "" }, { "docid": "c72cd5bbc646397ea3eb5ee880ad26ee", "score": "0.4799644", "text": "func DOPARespondGTE(v string) predicate.Agentkyc {\n\treturn predicate.Agentkyc(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldDOPARespond), v))\n\t})\n}", "title": "" }, { "docid": "1aa67930f32ddd739227b152548c864c", "score": "0.47730154", "text": "func FurnitureAmountGTE(v int) predicate.FurnitureDetail {\n\treturn predicate.FurnitureDetail(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldFurnitureAmount), v))\n\t})\n}", "title": "" }, { "docid": "c06defbb5db8a97c45736a46712494b4", "score": "0.4768704", "text": "func TenantGT(v string) predicate.Lease {\n\treturn predicate.Lease(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldTenant), v))\n\t})\n}", "title": "" }, { "docid": "7447287a1e9b2a672e6c2613e43be3d2", "score": "0.47643873", "text": "func PanelGTE(v string) predicate.DRoom {\n\treturn predicate.DRoom(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPanel), v))\n\t})\n}", "title": "" }, { "docid": "08d42b57e4d943cac1c9aea389a00e3c", "score": "0.47436646", "text": "func DescriptionGTE(v string) predicate.Template {\n\treturn predicate.Template(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldDescription), v))\n\t})\n}", "title": "" }, { "docid": "3f75da7187b22fb46b71f3c22d8a95c7", "score": "0.4742691", "text": "func TsGTE(v time.Time) predicate.K8sMetric {\n\treturn predicate.K8sMetric(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldTs), v))\n\t})\n}", "title": "" }, { "docid": "074b9f6a30d09f235063e62af0b3bb2f", "score": "0.47344157", "text": "func (f ArrayField) Gt(field ArrayField) Predicate {\n\treturn BinaryPredicate{\n\t\tOperator: PredicateGt,\n\t\tLeftField: f,\n\t\tRightField: field,\n\t}\n}", "title": "" }, { "docid": "48ec7e64815c2439c2c8deaa79accbcf", "score": "0.47315058", "text": "func DrugTypeGTE(v string) predicate.Drug {\n\treturn predicate.Drug(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldDrugType), v))\n\t})\n}", "title": "" }, { "docid": "4f6a389f41bb0a41f4a90c8cfc1f3e7c", "score": "0.47251138", "text": "func LocationGTE(v string) predicate.Sensor {\n\treturn predicate.Sensor(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldLocation), v))\n\t})\n}", "title": "" }, { "docid": "19d2ff168b90ccd4031d69c8591b6801", "score": "0.47170377", "text": "func RoomnumberGTE(v string) predicate.Specialdoctor {\n\treturn predicate.Specialdoctor(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldRoomnumber), v))\n\t})\n}", "title": "" }, { "docid": "1ab1efba0601313da2c63651f96a8bd0", "score": "0.47128353", "text": "func SizeGTE(v int) predicate.File {\n\treturn predicate.File(sql.FieldGTE(FieldSize, v))\n}", "title": "" }, { "docid": "51f6421bf2de6bd113d69c4d59c5b250", "score": "0.47015482", "text": "func RegisterBirthdayGT(v time.Time) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldRegisterBirthday), v))\n\t})\n}", "title": "" }, { "docid": "d448c2bba02369f60449863db34a2fb9", "score": "0.4684313", "text": "func PatientHeightIn(vs ...float64) predicate.Patient {\n\tv := make([]interface{}, len(vs))\n\tfor i := range v {\n\t\tv[i] = vs[i]\n\t}\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\t// if not arguments were provided, append the FALSE constants,\n\t\t// since we can't apply \"IN ()\". This will make this predicate falsy.\n\t\tif len(v) == 0 {\n\t\t\ts.Where(sql.False())\n\t\t\treturn\n\t\t}\n\t\ts.Where(sql.In(s.C(FieldPatientHeight), v...))\n\t})\n}", "title": "" }, { "docid": "daadd2dfa821e7b7bdd0395bf48ea631", "score": "0.46836278", "text": "func HostGTE(v string) predicate.DNSDetectorResult {\n\treturn predicate.DNSDetectorResult(sql.FieldGTE(FieldHost, v))\n}", "title": "" }, { "docid": "f9883e3ef2c4de837ca0a2a6c81890c4", "score": "0.46836174", "text": "func PeriodicityGTE(v string) predicate.Task {\n\treturn predicate.Task(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPeriodicity), v))\n\t})\n}", "title": "" }, { "docid": "0b16658736a53aae6d9839fb7b357152", "score": "0.46798506", "text": "func BigIntGTE(v schema.BigInt) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldBigInt), v))\n\t})\n}", "title": "" }, { "docid": "a65f8c3a528fa14cd18490ee60f3b06f", "score": "0.46779013", "text": "func PatientNameGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientName), v))\n\t})\n}", "title": "" }, { "docid": "a65f8c3a528fa14cd18490ee60f3b06f", "score": "0.46779013", "text": "func PatientNameGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientName), v))\n\t})\n}", "title": "" }, { "docid": "a65f8c3a528fa14cd18490ee60f3b06f", "score": "0.46779013", "text": "func PatientNameGTE(v string) predicate.Patient {\n\treturn predicate.Patient(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldPatientName), v))\n\t})\n}", "title": "" }, { "docid": "28b0dcab5651554cccd65e09fdc291f7", "score": "0.4674455", "text": "func AmountGTE(v float64) predicate.Sample {\n\treturn predicate.Sample(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldAmount), v))\n\t})\n}", "title": "" }, { "docid": "c9d56085c1ee5e90d0f624c59d5876ff", "score": "0.4662882", "text": "func HashGTE(v string) predicate.User {\n\treturn predicate.User(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldHash), v))\n\t})\n}", "title": "" }, { "docid": "1ca9038d7113f251b3f5d64dd544f292", "score": "0.46568832", "text": "func OutputGTE(v string) predicate.InstanceRuntime {\n\treturn predicate.InstanceRuntime(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldOutput), v))\n\t})\n}", "title": "" }, { "docid": "e88c6f878d86b1b71c9e66bdc83174df", "score": "0.46531153", "text": "func Gt(field string, value interface{}) *GtPredicate {\n\treturn &GtPredicate{\n\t\tSimplePredicate{\n\t\t\tField: field,\n\t\t\tValue: value,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "108d3654c2d1ae2cb11ced4e9c8664a1", "score": "0.4646066", "text": "func TelGTE(v string) predicate.Employee {\n\treturn predicate.Employee(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldTel), v))\n\t})\n}", "title": "" }, { "docid": "c73d2e3d49867d3ceeb5381fbdeb1673", "score": "0.46404502", "text": "func KYCRespondGTE(v string) predicate.Agentkyc {\n\treturn predicate.Agentkyc(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldKYCRespond), v))\n\t})\n}", "title": "" }, { "docid": "287877c88b0730854c85be1ca0eee6bf", "score": "0.46292198", "text": "func DataGT(v string) predicate.InstanceRuntime {\n\treturn predicate.InstanceRuntime(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldData), v))\n\t})\n}", "title": "" }, { "docid": "f64cd1f37f5c93fd10bf3b228610f3d8", "score": "0.46204168", "text": "func KYCTimeGTE(v string) predicate.Agentkyc {\n\treturn predicate.Agentkyc(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldKYCTime), v))\n\t})\n}", "title": "" }, { "docid": "1eccf75f18c40289ee69b0944610aae9", "score": "0.4618782", "text": "func RegisterPatientIDGT(v string) predicate.Register {\n\treturn predicate.Register(func(s *sql.Selector) {\n\t\ts.Where(sql.GT(s.C(FieldRegisterPatientID), v))\n\t})\n}", "title": "" }, { "docid": "3c942296e887a6c3f21ebbaa9db09921", "score": "0.46187088", "text": "func PasswordGTE(v string) predicate.User {\n\treturn predicate.User(sql.FieldGTE(FieldPassword, v))\n}", "title": "" }, { "docid": "6d6ed76d557db07c96b56842e65c7750", "score": "0.46164685", "text": "func (f NumberField) Gt(field NumberField) Predicate {\n\treturn CustomPredicate{\n\t\tFormat: \"? > ?\",\n\t\tValues: []interface{}{f, field},\n\t}\n}", "title": "" }, { "docid": "76016e7aa01bbc8420f67a463baa8bfb", "score": "0.46045515", "text": "func TasteGTE(v string) predicate.Taste {\n\treturn predicate.Taste(func(s *sql.Selector) {\n\t\ts.Where(sql.GTE(s.C(FieldTaste), v))\n\t})\n}", "title": "" } ]
f5fbfa369200064185be654ebfc05893
decrypt reads lines of text, encrypts them, and prints the decrypted plaintext.
[ { "docid": "6a275f1d76bddf07be8a010ce9e7a272", "score": "0.5616346", "text": "func decrypt(in io.Reader) error {\n\tinput := bufio.NewScanner(in)\n\tfor input.Scan() {\n\t\tbroadcast := rsaBroadcaster(input.Text())\n\t\tbuf := breakBroadcast(broadcast)\n\t\tfmt.Println(string(buf))\n\t}\n\treturn input.Err()\n}", "title": "" } ]
[ { "docid": "a9581f9105566fd2d42d430984b7f3d1", "score": "0.59707147", "text": "func decrypt(in io.Reader, mode cipher.BlockMode) error {\n\tbuf, err := ioutil.ReadAll(base64.NewDecoder(base64.StdEncoding, in))\n\tif err != nil {\n\t\treturn err\n\t}\n\tmode.CryptBlocks(buf, buf)\n\tif buf, err = PKCS7Unpad(buf, mode.BlockSize()); err != nil {\n\t\treturn err\n\t}\n\tfmt.Print(string(buf))\n\n\treturn nil\n}", "title": "" }, { "docid": "57e6ab27820a932c74b1889ab51b7ee1", "score": "0.58604085", "text": "func (k *KMS) Decrypt(cipherText []byte) ([]byte, error) {\n\tout, err := k.client.Decrypt(&kms.DecryptInput{\n\t\tCiphertextBlob: cipherText,\n\t\tEncryptionContext: map[string]*string{\n\t\t\t\"Tool\": aws.String(\"vaultops\"),\n\t\t},\n\t\tGrantTokens: []*string{},\n\t})\n\n\treturn out.Plaintext, err\n}", "title": "" }, { "docid": "3f298cb0394d0ab6d03262b569a642fa", "score": "0.579017", "text": "func decrypt(key, text []byte) ([]byte, error) {\r\n\tblock, err := aes.NewCipher(key)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\tif len(text) < aes.BlockSize {\r\n\t\treturn nil, errors.New(\"ciphertext too short\")\r\n\t}\r\n\tiv := text[:aes.BlockSize]\r\n\ttext = text[aes.BlockSize:]\r\n\tcfb := cipher.NewCFBDecrypter(block, iv)\r\n\tcfb.XORKeyStream(text, text)\r\n\tdata, err := base64.StdEncoding.DecodeString(string(text))\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\treturn data, nil\r\n}", "title": "" }, { "docid": "aeabf3597a1af64fdcdcb8186df6cb40", "score": "0.57707196", "text": "func decrypt(in io.Reader, c cipher.Block) error {\n\tin = base64.NewDecoder(base64.StdEncoding, in)\n\tbuf, err := ioutil.ReadAll(in)\n\tif err != nil {\n\t\treturn err\n\t}\n\tNewECBDecrypter(c).CryptBlocks(buf, buf)\n\tbuf, err = PKCS7Unpad(buf, c.BlockSize())\n\tif err != nil {\n\t\treturn err\n\t}\n\tfmt.Print(string(buf))\n\n\treturn nil\n}", "title": "" }, { "docid": "bde19145f7ab018556a24e19d913db99", "score": "0.5723459", "text": "func Decrypt(key, text string) []byte {\n\t// The byte array we will return with the decrypted string. This could be converted to a string if required\n\tvar ciphertext []byte\n\n\t// Assuming that this was encypted using either the node or the other method in this file it needs to be decoded from a hex string\n\tciphertext, _ = hex.DecodeString(text)\n\n\t// Create the cipher for decrypting the encrypted string.IMPORTANT!!!! this key needs to be 32 characters long\n\tblock, _ := aes.NewCipher([]byte(key))\n\n\t// Check that the cipher array size is devisable by the block size. If not then it cannot decrypt\n\tif len(ciphertext)%aes.BlockSize != 0 {\n\t\tpanic(\"Cipher text is \" + strconv.Itoa(len(ciphertext)) + \" long but should be \" + strconv.Itoa(aes.BlockSize))\n\t} else {\n\t\tmode := cipher.NewCBCDecrypter(block, []byte(iv))\n\n\t\t// Decrypt the text into the bye array we set up\n\t\tmode.CryptBlocks(ciphertext, ciphertext)\n\n\t\t// The passed in text was probably padded when encypted to make up the block size. We need to remove this padding now the decryption is done\n\t\tciphertext = unpad(ciphertext)\n\t}\n\n\t// Return the decrypted text (Assuming everything went well)\n\treturn ciphertext\n}", "title": "" }, { "docid": "ae5770b1496204f6e5a2ea9e5236cf4e", "score": "0.56132865", "text": "func (c *AESCBCCrypto) Decrypt(cipherText []byte, mode AESPaddingMode) ([]byte, error) {\n\tblock, err := aes.NewCipher(c.key)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(c.iv) != block.BlockSize() {\n\t\treturn nil, errors.New(\"yiigo: IV length must equal block size\")\n\t}\n\n\tplainText := make([]byte, len(cipherText))\n\n\tblockMode := cipher.NewCBCDecrypter(block, c.iv)\n\tblockMode.CryptBlocks(plainText, cipherText)\n\n\tswitch mode {\n\tcase PKCS5:\n\t\tplainText = c.unpadding(plainText, block.BlockSize())\n\tcase PKCS7:\n\t\tplainText = c.unpadding(plainText, len(c.key))\n\t}\n\n\treturn plainText, nil\n}", "title": "" }, { "docid": "51bbb81ae05b7916e801bb1f4c145bc0", "score": "0.5575901", "text": "func (k *keeper) Decrypt(ctx context.Context, ciphertext []byte) ([]byte, error) {\n\tout, err := k.client.Logical().Write(\n\t\tpath.Join(k.opts.Engine+\"/decrypt\", k.keyID),\n\t\tmap[string]interface{}{\n\t\t\t\"ciphertext\": string(ciphertext),\n\t\t},\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn base64.StdEncoding.DecodeString(out.Data[\"plaintext\"].(string))\n}", "title": "" }, { "docid": "80c9b267df9b7533bf747d96742547f7", "score": "0.5572955", "text": "func Decrypt(keyFilenames ...string) error {\n\tif len(keyFilenames) == 0 && password == \"\" && sessionKey == \"\" {\n\t\tprintln(\"Please provide decryption keys, session key, or passphrase\")\n\t\treturn Err69\n\t}\n\n\tplaintextBytes, err := ioutil.ReadAll(os.Stdin)\n\tif err != nil {\n\t\treturn decErr(err)\n\t}\n\tif password != \"\" {\n\t\treturn passwordDecrypt(plaintextBytes)\n\t}\n\tprivKeyRing, err := utils.CollectKeys(keyFilenames...)\n\tif err != nil {\n\t\treturn decErr(err)\n\t}\n\n\tciphertext, err := crypto.NewPGPMessageFromArmored(string(plaintextBytes))\n\tif err != nil {\n\t\t// If that fails, try binary\n\t\tciphertext = crypto.NewPGPMessage(plaintextBytes)\n\t}\n\n\tsplit, err := ciphertext.SeparateKeyAndData(0, 0)\n\tif err != nil {\n\t\treturn decErr(err)\n\t}\n\n\terr = handleSessionKeys(split.GetBinaryKeyPacket(), privKeyRing)\n\tif err != nil {\n\t\treturn decErr(err)\n\t}\n\tif sessionKey != \"\" {\n\t\treturn sessionKeyDecrypt(split.GetBinaryDataPacket())\n\t}\n\n\tvar pubKeyRing *crypto.KeyRing\n\tif verifyWith != \"\" {\n\t\tpubKeyRing, err = utils.CollectKeys([]string{verifyWith}...)\n\t\tif err != nil {\n\t\t\treturn decErr(err)\n\t\t}\n\t}\n\n\tmessage, err := privKeyRing.Decrypt(ciphertext, pubKeyRing, crypto.GetUnixTime())\n\tif err != nil {\n\t\treturn decErr(err)\n\t}\n\n\tif _, err = os.Stdout.Write(message.Data); err != nil {\n\t\treturn decErr(err)\n\t}\n\n\tif verifyOut != \"\" {\n\t\t// TODO: This is fake\n\t\tif err := writeVerificationToFile(pubKeyRing); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fb6ce9aff5b59d52d88fd5288c7d48a5", "score": "0.5562034", "text": "func Decipher(ciphertext []byte, cipher_pass []byte) []byte {\n\n\t//Falta validar que el password de cifrado sea correcto.\n\n\tblock, err := aes.NewCipher(cipher_pass)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tplain_text := make([]byte, len(ciphertext[aes.BlockSize:]))\n\tstream := cipher.NewCTR(block, ciphertext[:aes.BlockSize])\n\tstream.XORKeyStream(plain_text, ciphertext[aes.BlockSize:])\n\n\treturn plain_text\n}", "title": "" }, { "docid": "bf3716177e0e1a76f14a30c64a200679", "score": "0.55605626", "text": "func (c *Ceaser) Decrypt(ciphertext string, key string) string {\n\ti, _ := strconv.Atoi(key)\n\treturn rotateText(ciphertext, -i)\n}", "title": "" }, { "docid": "238d0abe9c46a2ce5161ff5b7cbacb70", "score": "0.5540949", "text": "func decrypt(ciphertext []byte) (plaintext []byte, err error) {\n\tif encryptionKey == nil || len(encryptionKey) == 0 {\n\t\tpanic(\"Cannot decrypt user information until encryption has been set\")\n\t}\n\n\tblock, err := aes.NewCipher(encryptionKey)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(ciphertext) < aes.BlockSize {\n\t\treturn nil, errors.New(\"ciphertext too short\")\n\t}\n\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\tplaintext = make([]byte, len(ciphertext))\n\tstream.XORKeyStream(plaintext, ciphertext)\n\treturn\n}", "title": "" }, { "docid": "b2a8bc8dceba96b709ef7352e62d9916", "score": "0.5440672", "text": "func (ag *AESGCM) Decrypt(cipherText []byte) (plainText []byte, err error) {\n\tgcm, err := cipher.NewGCM(ag.block)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"unable to wrap cipher in GCM\")\n\t}\n\n\tif len(cipherText) < gcm.NonceSize() {\n\t\treturn nil, errors.Wrap(err, \"unable to read random nonce\")\n\t}\n\n\treturn gcm.Open(nil,\n\t\tcipherText[:gcm.NonceSize()],\n\t\tcipherText[gcm.NonceSize():],\n\t\tnil,\n\t)\n}", "title": "" }, { "docid": "0a3a3cefcae1e7c83f987565fc5c0fca", "score": "0.54397655", "text": "func Decrypt(cipherText []byte, targetPrivKey *rsa.PrivateKey) (string, error) {\n\tvar plainText string\n\n\tlabel := []byte(\"\")\n\trandomHash := sha256.New()\n\n\tpText, err := rsa.DecryptOAEP(randomHash, rand.Reader, targetPrivKey, cipherText, label)\n\tif err != nil {\n\t\tlog.Print(\"unable to decrypt text message: \", err)\n\t\treturn plainText, err\n\t}\n\tplainText = string(pText)\n\treturn plainText, nil\n}", "title": "" }, { "docid": "7f3607f70aac18286df0f860dbdf8561", "score": "0.5382187", "text": "func CTRDecrypt(cipherText CipherText, key Secret) (PlainText, error) {\n\n\t// create block\n\tblock, err := aes.NewCipher(key[:])\n\tif err != nil {\n\t\treturn PlainText{}, err\n\t}\n\n\t// validate key\n\tvalid, err := cipherText.ValidMAC(key)\n\tif err != nil {\n\t\treturn PlainText{}, err\n\t}\n\tif !valid {\n\t\treturn PlainText{}, MacError\n\t}\n\n\t// decrypt\n\tplainText := make(PlainText, len(cipherText.CipherText))\n\tstream := cipher.NewCTR(block, cipherText.IV)\n\tstream.XORKeyStream(plainText, cipherText.CipherText)\n\n\treturn plainText, nil\n\n}", "title": "" }, { "docid": "acf272e89bef2ff36589f09b8bad3ea8", "score": "0.5380232", "text": "func Decrypt(g *Command, tx string) {\n\toutput := yamlcustom.ParseEncyptYAML(g.name)\n\tt := output.Telegram[0].Token\n\tc := output.Telegram[0].ChatID\n\ta := output.Aws[0].Arn\n\n\ttk := awskms.DecryptAwsCred(a, t)\n\tci := awskms.DecryptAwsCred(a, c)\n\n\tsci, err := strconv.ParseInt(ci, 10, 64)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tSendMessage(tk, sci, tx)\n}", "title": "" }, { "docid": "78e08849816b198cf15d9ecdab05e57d", "score": "0.53709567", "text": "func Decrypt(secretkey io.Reader, passphrase string, text []byte) ([]byte, error) {\n\tif secretkey == nil {\n\t\treturn nil, errors.New(\"invalid argument\")\n\t}\n\n\tvar (\n\t\tkeys, err = openpgp.ReadArmoredKeyRing(secretkey)\n\t\tpassphraseb = []byte(passphrase)\n\t\tmd *openpgp.MessageDetails\n\t)\n\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tkey := keys[0]\n\tkey.PrivateKey.Decrypt(passphraseb)\n\n\tfor _, subkey := range key.Subkeys {\n\t\tsubkey.PrivateKey.Decrypt(passphraseb)\n\t}\n\n\tif md, err = openpgp.ReadMessage(bytes.NewBuffer(text), keys, nil, nil); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ioutil.ReadAll(md.UnverifiedBody)\n}", "title": "" }, { "docid": "fdd7e595fb0bb080fb60d21361a0329d", "score": "0.5355422", "text": "func ReadDecrypted(hashInput, encryptedString string) (decryptedString string, err error) {\r\n\r\n\tvar key [32]byte\r\n\tcopy(key[:], getHash(hashInput))\r\n\r\n\tvar ciphertext, decryptedByte []byte\r\n\r\n\tciphertext, err = hex.DecodeString(encryptedString)\r\n\tdecryptedByte, err = decryptNaCl(&key, ciphertext)\r\n\tdecryptedString = string(decryptedByte[:])\r\n\r\n\treturn\r\n}", "title": "" }, { "docid": "8a5ef1903364f2b723c6426da6fd8221", "score": "0.53461707", "text": "func (p *Polybius) Decrypt(text string) (string, error) {\n\tchars := []rune(strings.ToUpper(text))\n\tdecryptedText := \"\"\n\tfor i := 0; i < len(chars); i += 2 {\n\t\tdecryptedChar, err := p.decipher(chars[i:int(math.Min(float64(i+2), float64(len(chars))))])\n\t\tif err != nil {\n\t\t\treturn \"\", fmt.Errorf(\"failed decipher: %w\", err)\n\t\t}\n\t\tdecryptedText += decryptedChar\n\t}\n\treturn decryptedText, nil\n}", "title": "" }, { "docid": "9ae60e11c2dfa11fc68587e055021636", "score": "0.5335587", "text": "func decrypt(ciphertext []byte, key []byte) ([]byte, error) {\n\n\t// Construct decrypter\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn []byte(\"\"), err\n\t}\n\n\t// IV is the counter. This is just 138.\n\tiv := make([]byte, 16)\n\tfor i := 0; i < 16; i++ {\n\t\tiv[i] = 0\n\t}\n\tiv[15] = 138\n\n\t// Ciphertext is big as plaintext.\n\tplain := make([]byte, len(ciphertext))\n\n\t// Construct CTR mode block cipher\n\tstream := cipher.NewCTR(block, iv)\n\n\t// Decrypt\n\tstream.XORKeyStream(plain, ciphertext)\n\n\treturn plain, nil\n\n}", "title": "" }, { "docid": "a477287892a21ebf4a61d72b11c43978", "score": "0.53298265", "text": "func decrypt(in io.Reader, score func([]byte) int) error {\n\tvar buf []byte\n\tinput := bufio.NewScanner(in)\n\tfor input.Scan() {\n\t\tline, err := hex.DecodeString(input.Text())\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\tbuf = append(buf, line...)\n\t}\n\tif err := input.Err(); err != nil {\n\t\treturn err\n\t}\n\tXORSingleByte(buf, buf, breakSingleXOR(buf, score))\n\tfmt.Println(string(buf))\n\n\treturn nil\n}", "title": "" }, { "docid": "ffe11929827612f808c0533f7ecb0ded", "score": "0.5310736", "text": "func (k *keeper) Decrypt(ctx context.Context, ciphertext []byte) ([]byte, error) {\n\treq := &kmspb.DecryptRequest{\n\t\tName: k.keyID,\n\t\tCiphertext: ciphertext,\n\t}\n\tresp, err := k.client.Decrypt(ctx, req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn resp.GetPlaintext(), nil\n}", "title": "" }, { "docid": "0c8d94ab797c13cbca281893ecdca2fa", "score": "0.5287953", "text": "func (ne *NoEncryption) Decrypt(ciphertext []byte) (plaintext []byte, err error) {\n\treturn ciphertext, nil\n}", "title": "" }, { "docid": "e00b58d2201899284b1d632dcddb0929", "score": "0.5272631", "text": "func (c *Crypto) Decrypt(cipher []byte) (plain []byte, err error) {\n\tplain, err = Cryptopasta.Decrypt(cipher, &c.key)\n\tif err != nil {\n\t\treturn nil, xerrors.Errorf(\"decrypt cipher to plain error: %w\", err)\n\t}\n\n\treturn plain, nil\n}", "title": "" }, { "docid": "c9e7d8a55f088339bfa4c8e8839933e7", "score": "0.5235155", "text": "func (v *VaultCliClient) Decrypt(key, ciphertext string) (string, error) {\n\treturn v.transit(v.decryptEndpoint(key), \"ciphertext\", ciphertext, \"plaintext\")\n}", "title": "" }, { "docid": "e5eb31dda421eecba049a68ecb611e87", "score": "0.5234142", "text": "func decrypt(key []byte, cryptoText string) string {\n\tciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\tpanic(\"ciphertext too short\")\n\t}\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn fmt.Sprintf(\"%s\", ciphertext)\n}", "title": "" }, { "docid": "e5eb31dda421eecba049a68ecb611e87", "score": "0.5234142", "text": "func decrypt(key []byte, cryptoText string) string {\n\tciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\tpanic(\"ciphertext too short\")\n\t}\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn fmt.Sprintf(\"%s\", ciphertext)\n}", "title": "" }, { "docid": "e5eb31dda421eecba049a68ecb611e87", "score": "0.5234142", "text": "func decrypt(key []byte, cryptoText string) string {\n\tciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\tpanic(\"ciphertext too short\")\n\t}\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn fmt.Sprintf(\"%s\", ciphertext)\n}", "title": "" }, { "docid": "a54e5bb9ff62e2981ca2378ea0830641", "score": "0.5205601", "text": "func (c Caesar) Decrypt(input string, key int) string {\n\t// left shift of \"key\" is same as right shift of 26-\"key\"\n\treturn c.Encrypt(input, 26-key)\n}", "title": "" }, { "docid": "7b878a8af87ab7af2874131165a75805", "score": "0.5188394", "text": "func (k *IceKey) decrypt(ciphertext []byte, plaintext *[]byte, idx int) {\n\tp1 := uint64(ciphertext[idx])<<24 | uint64(ciphertext[idx+1])<<16 | uint64(ciphertext[idx+2])<<8 | uint64(ciphertext[idx+3])\n\tp2 := uint64(ciphertext[idx+4])<<24 | uint64(ciphertext[idx+5])<<16 | uint64(ciphertext[idx+6])<<8 | uint64(ciphertext[idx+7])\n\tfor i := k.rounds - 1; i > 0; i -= 2 {\n\t\tp1 ^= k.roundFunc(p2, i, k.keySchedule)\n\t\tp2 ^= k.roundFunc(p1, i-1, k.keySchedule)\n\t}\n\tfor i := 0; i < 4; i++ {\n\t\t(*plaintext)[idx+3-i] = byte(p2 & uint64(0xff))\n\t\t(*plaintext)[idx+7-i] = byte(p1 & uint64(0xff))\n\t\tp2 >>= 8\n\t\tp1 >>= 8\n\t}\n}", "title": "" }, { "docid": "b5fc4d34a0e2be925af2745751532682", "score": "0.518811", "text": "func Decrypt(cryptoText string) (string, error) {\n\tkey, err := cryptKey()\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tciphertext, err := base64.URLEncoding.DecodeString(cryptoText)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif byteLen := len(ciphertext); byteLen < aes.BlockSize {\n\t\treturn \"\", fmt.Errorf(\"invalid cipher size %d.\", byteLen)\n\t}\n\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tcipher.NewCFBDecrypter(block, iv).XORKeyStream(ciphertext, ciphertext)\n\n\treturn string(ciphertext), nil\n}", "title": "" }, { "docid": "71207fc7308d807fb3cb9e2e00331a3a", "score": "0.51756144", "text": "func (pk Cipher) Decrypt(message string) (string, error) {\n\treturn message, nil\n}", "title": "" }, { "docid": "4ff165bdad3614adb14091217efb2445", "score": "0.51667166", "text": "func main() {\n\tenc, err := ioutil.ReadFile(\"cipher.dat\")\n\tif err != nil {\n\t\tlog.Fatalf(\"error in opening file: %v\", err)\n\t}\n\n\tbufenc, err := base64.StdEncoding.DecodeString(string(enc))\n\tif err != nil {\n\t\tlog.Fatalf(\"error in decoding base64 string: %v\", err)\n\t}\n\n\tacipher, err := aes.NewCipher([]byte(\"YELLOW SUBMARINE\"))\n\tif err != nil {\n\t\tlog.Fatalf(\"error in creating aes cipher: %v\", err)\n\t}\n\n\tfor i := 0; i < len(bufenc); i += 16 {\n\t\tbuf := make([]byte, 16)\n\t\tacipher.Decrypt(buf, bufenc[i:i+16])\n\t\tfmt.Printf(\"%s\", string(buf))\n\t}\n\n}", "title": "" }, { "docid": "cf471138b204abc9c4c254277de4054f", "score": "0.5163547", "text": "func decrypt(key []byte, cryptoText string) (string, error) {\n\tciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\treturn \"\", fmt.Errorf(\"ciphertext too short\")\n\t}\n\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn fmt.Sprintf(\"%s\", ciphertext), nil\n}", "title": "" }, { "docid": "cfb16275b09a5f62a3191d086ef1c945", "score": "0.51429766", "text": "func (c *Client) decrypt(data string) (string, error) {\n\tchunks := make([]string, 0)\n\tfor i := 0; i < len(data); i += 16 {\n\t\tvar buf [16]byte\n\t\tvar decoded, decrypted [8]byte\n\t\tcopy(buf[:], data[i:])\n\t\t_, err := hex.Decode(decoded[:], buf[:])\n\t\tif err != nil {\n\t\t\treturn \"\", err\n\t\t}\n\t\tc.decrypter.Decrypt(decrypted[:], decoded[:])\n\t\tchunks = append(chunks, strings.Trim(string(decrypted[:]), \"\\x00\"))\n\t}\n\treturn strings.Join(chunks, \"\"), nil\n}", "title": "" }, { "docid": "6842d0a648de393c2ce6880182d8378f", "score": "0.5142032", "text": "func Decrypt(msg string) string {\n\tciphertext, _ := hex.DecodeString(msg)\n\n\tblock, err := aes.NewCipher(encryptionKey)\n\tif err != nil {\n\t\tlogger.Panic(\"[Commons][Crypto] Error at Decrypt.NewCipher: %+v\", err)\n\t}\n\tif len(ciphertext) < aes.BlockSize {\n\t\tlogger.Panic(\"[Commons][Crypto] Error at Decrypt: ciphertext too short\")\n\t}\n\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tif len(ciphertext)%aes.BlockSize != 0 {\n\t\tlogger.Panic(\"[Commons][Crypto] Error at Decrypt: ciphertext is not a multiple of the block size\")\n\t}\n\n\tmode := cipher.NewCBCDecrypter(block, iv)\n\tmode.CryptBlocks(ciphertext, ciphertext)\n\tpaddingCount := int(ciphertext[len(ciphertext)-1])\n\tciphertext = ciphertext[:len(ciphertext)-paddingCount]\n\n\treturn string(ciphertext)\n}", "title": "" }, { "docid": "f6c24cae045cd3ee59d3944d1224c30f", "score": "0.51323724", "text": "func Decrypt(ciphertext []byte) []byte {\n\tplaintext := make([]byte, len(ciphertext))\n\n\tkey := iv\n\tfor i, currentByte := range ciphertext {\n\t\tdecByte := key ^ currentByte\n\t\tkey = currentByte\n\t\tplaintext[i] = decByte\n\t}\n\n\treturn plaintext\n}", "title": "" }, { "docid": "3236e948e3bd2d4953c04e79a9fb6d9b", "score": "0.5115835", "text": "func encrypt(key, text []byte) []byte {\n\tblock,err := aes.NewCipher(key)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tciphertext := make([]byte, aes.BlockSize + len(text))\n\tiv := ciphertext[:aes.BlockSize]\n\tif _,err := io.ReadFull(rand.Reader, iv); err != nil {\n\t\tpanic(err)\n\t}\n\tcbc := cipher.NewCBCEncrypter(block, iv)\n\t//pad text to multiple of 32bytes\n\tcbc.CryptBlocks(ciphertext[aes.BlockSize:],text)\n\treturn ciphertext\n}", "title": "" }, { "docid": "c6fdd290656e431f584bf4a199fba632", "score": "0.5110983", "text": "func Decrypt(crypt string) (string, error) {\n\tif !strings.HasPrefix(crypt, magic) {\n\t\treturn \"\", decryptError\n\t}\n\tvar n []byte\n\t// Remove magic from input\n\tb := []byte(crypt)[3:]\n\n\tfirst, b, err := nibble(b, 1)\n\tif err != nil {\n\t\treturn \"\", nil\n\t}\n\t_, b, err = nibble(b, extraNum[first[0]])\n\tif err != nil {\n\t\treturn \"\", nil\n\t}\n\tprev := first[0]\n\tdecrypt := make([]byte, 0)\n\n\t// Iterate till b has something\n\tfor len(b) > 0 {\n\t\tdecode := encoding[len(decrypt)%len(encoding)]\n\t\tn, b, err = nibble(b, len(decode))\n\t\tif err != nil {\n\t\t\treturn \"\", nil\n\t\t}\n\t\tgaps := make([]byte, 0)\n\t\tfor _, nb := range n {\n\t\t\tg := gap(prev, nb)\n\t\t\tprev = nb\n\t\t\tgaps = append(gaps, g)\n\t\t}\n\t\tdecrypt = append(decrypt, gapDecode(gaps, decode))\n\t}\n\treturn string(decrypt), nil\n}", "title": "" }, { "docid": "bba95888bff7807f3782b69a1e31d08e", "score": "0.51079124", "text": "func Decrypt(key []byte, cryptoText []byte) (string, error) {\n\tciphertext, _ := base64.URLEncoding.DecodeString(string(cryptoText))\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\tpanic(\"ciphertext too short\")\n\t}\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn fmt.Sprintf(\"%s\", ciphertext), nil\n}", "title": "" }, { "docid": "8d60f4bc7c9944595e9ffe34a841f6bd", "score": "0.50800925", "text": "func (c *Ceaser) Encrypt(plaintext string, key string) string {\n\ti, _ := strconv.Atoi(key)\n\treturn rotateText(plaintext, i)\n}", "title": "" }, { "docid": "e5ec5570eb5989ab71242fcea9aecf44", "score": "0.50769424", "text": "func AesDecrypt(ciphertext *[]byte, key []byte) error {\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif len(*ciphertext) < aes.BlockSize {\n\t\treturn errors.New(\"Text is too short\")\n\t}\n\n\t// Get the 16 byte IV\n\tiv := (*ciphertext)[:aes.BlockSize]\n\n\t// Remove the IV from the ciphertext\n\t*ciphertext = (*ciphertext)[aes.BlockSize:]\n\n\t// Return a decrypted stream\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// Decrypt bytes from ciphertext\n\tstream.XORKeyStream(*ciphertext, *ciphertext)\n\n\treturn nil\n}", "title": "" }, { "docid": "fa41f0b287df591a328ef9b48fbd5035", "score": "0.5075768", "text": "func (eg *ElGamal) Decrypt(sec *SecretKey, c1, c2 curve.Point) []byte {\n\ts := eg.Curve.PointScalarMul(c1, sec.X)\n\treturn eg.Curve.SubPoints(c2, s).Encode()\n}", "title": "" }, { "docid": "6d297cd10ce2d327515176c2aead7a25", "score": "0.506753", "text": "func Decrypt(c, k1, k2 Multivector) Multivector {\n\tk2i := Inverse(k2)\n\tk1i := Inverse(k1)\n\tcgp := GeometricProduct(k1i, c)\n\treturn GeometricProduct(cgp, k2i)\n}", "title": "" }, { "docid": "432951045938e420f592f30a625c61e6", "score": "0.5066054", "text": "func DesDecryption(key, cipherText []byte) []byte {\n\n\tblock, err := des.NewCipher(key)\n\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tblockMode := ecb.NewECBDecrypter(block)\n\toriginalData := make([]byte, len(cipherText))\n\tblockMode.CryptBlocks(originalData, cipherText)\n\treturn originalData\n}", "title": "" }, { "docid": "6f2bd748d9385517febfda98d72a9c95", "score": "0.50647354", "text": "func Decrypt(keyText, cryptoText string) string {\n\n\t// key := []byte(keyText)\n\tkey := normalizeKey(keyText)\n\tciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\tpanic(\"ciphertext too short\")\n\t}\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn fmt.Sprintf(\"%s\", ciphertext)\n}", "title": "" }, { "docid": "cb834b7527dd29e886da5c41fc449e5e", "score": "0.5047373", "text": "func Cipher(plain_text []byte, cipher_pass []byte) []byte {\n\tblock, err := aes.NewCipher(cipher_pass)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\tciphertext := make([]byte, aes.BlockSize+len(plain_text))\n\tiv := ciphertext[:aes.BlockSize]\n\n\tif _, err := io.ReadFull(rand.Reader, iv); err != nil {\n\t\tpanic(err)\n\t}\n\n\tstream := cipher.NewCTR(block, iv)\n\tstream.XORKeyStream(ciphertext[aes.BlockSize:], plain_text)\n\n\treturn ciphertext\n}", "title": "" }, { "docid": "9d9e568fcc4fb1980c2c3dc5e23fbd5a", "score": "0.5042839", "text": "func Decrypt(k, in []byte) ([]byte, error) {\n\tif len(in) == 0 || len(in)%aes.BlockSize != 0 {\n\t\treturn nil, ErrInvalidCiphertext\n\t}\n\n\tc, err := aes.NewCipher(k)\n\tif err != nil {\n\t\treturn nil, ErrInvalidKey\n\t}\n\n\tcbc := cipher.NewCBCDecrypter(c, in[:aes.BlockSize])\n\tcbc.CryptBlocks(in[aes.BlockSize:], in[aes.BlockSize:])\n\tout := Unpad(in[aes.BlockSize:])\n\tif out == nil {\n\t\treturn nil, ErrInvalidPadding\n\t}\n\treturn out, nil\n\n}", "title": "" }, { "docid": "aea500d092bbf9f7a690ab5430579fcf", "score": "0.5022085", "text": "func DecapsulateDecrypt(c []byte, iv []byte, sikeSK []byte, ek []byte) (rc int, p []byte) {\n\n\trtn := C.pqnist_decapsulate_decrypt(\n\t\t(*C.char)(unsafe.Pointer(&c[0])),\n\t\tC.int(len(c)),\n\t\t(*C.char)(unsafe.Pointer(&iv[0])),\n\t\t(*C.char)(unsafe.Pointer(&sikeSK[0])),\n\t\t(*C.char)(unsafe.Pointer(&ek[0])))\n\trc = int(rtn)\n\n\treturn rc, c\n}", "title": "" }, { "docid": "300875ec1e75b0e99cb807780e2cd836", "score": "0.5021561", "text": "func (c *Client) Decrypt(request *DecryptRequest) (response *DecryptResponse, err error) {\n if request == nil {\n request = NewDecryptRequest()\n }\n response = NewDecryptResponse()\n err = c.Send(request, response)\n return\n}", "title": "" }, { "docid": "17f653a2945ea134907eb7413d77907a", "score": "0.5016756", "text": "func (n *Notification) Decrypt(encryptionKey []byte) error {\n\ttitle, err := DecryptAES(n.Title, encryptionKey)\n\tif err == nil {\n\t\tn.Title = title\n\t}\n\n\tmessage, err := DecryptAES(n.Message, encryptionKey)\n\tif err == nil {\n\t\tn.Message = message\n\t}\n\n\timage, err := DecryptAES(n.Image, encryptionKey)\n\tif err == nil {\n\t\tn.Image = image\n\t}\n\n\tlink, err := DecryptAES(n.Link, encryptionKey)\n\tif err == nil {\n\t\tn.Link = link\n\t}\n\treturn err\n}", "title": "" }, { "docid": "d75f81aa039d5e1282b6026bed631935", "score": "0.50165516", "text": "func Decrypt(suite abstract.Suite, ciphertext []byte, anonymitySet Set,\n\tmine int, privateKey abstract.Scalar, hide bool) ([]byte, error) {\n\n\t// Decrypt and check the encrypted key-header.\n\txb, hdrlen, err := decryptKey(suite, ciphertext, anonymitySet,\n\t\tmine, privateKey, hide)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Determine the message layout\n\tcipher := suite.Cipher(xb)\n\tmaclen := cipher.KeySize()\n\tif len(ciphertext) < hdrlen+maclen {\n\t\treturn nil, errors.New(\"ciphertext too short\")\n\t}\n\thdrhi := hdrlen\n\tmsghi := len(ciphertext) - maclen\n\n\t// Decrypt the message and check the MAC\n\tctx := ciphertext[hdrhi:msghi]\n\tmac := ciphertext[msghi:]\n\tmsg := make([]byte, len(ctx))\n\tcipher.Message(msg, ctx, ctx)\n\tcipher.Partial(mac, mac, nil)\n\tif subtle.ConstantTimeAllEq(mac, 0) == 0 {\n\t\treturn nil, errors.New(\"invalid ciphertext: failed MAC check\")\n\t}\n\treturn msg, nil\n}", "title": "" }, { "docid": "f391ff97b64af0062bc1c9ac0a61a209", "score": "0.50145876", "text": "func Decrypt(KMS kms.KMS, ciphertext io.Reader, context kms.Context) (io.Reader, error) {\n\tconst (\n\t\tMaxMetadataSize = 1 << 20 // max. size of the metadata\n\t\tVersion = 1\n\t)\n\n\tvar header [5]byte\n\tif _, err := io.ReadFull(ciphertext, header[:]); err != nil {\n\t\treturn nil, err\n\t}\n\tif header[0] != Version {\n\t\treturn nil, fmt.Errorf(\"config: unknown ciphertext version %d\", header[0])\n\t}\n\tsize := binary.LittleEndian.Uint32(header[1:])\n\tif size > MaxMetadataSize {\n\t\treturn nil, errors.New(\"config: encryption metadata is too large\")\n\t}\n\n\tvar (\n\t\tmetadataBuffer = make([]byte, size)\n\t\tmetadata encryptedObject\n\t)\n\tif _, err := io.ReadFull(ciphertext, metadataBuffer); err != nil {\n\t\treturn nil, err\n\t}\n\tvar json = jsoniter.ConfigCompatibleWithStandardLibrary\n\tif err := json.Unmarshal(metadataBuffer, &metadata); err != nil {\n\t\treturn nil, err\n\t}\n\tif fips.Enabled && metadata.Algorithm != sio.AES_256_GCM {\n\t\treturn nil, fmt.Errorf(\"config: unsupported encryption algorithm: %q is not supported in FIPS mode\", metadata.Algorithm)\n\t}\n\n\tkey, err := KMS.DecryptKey(metadata.KeyID, metadata.KMSKey, context)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstream, err := metadata.Algorithm.Stream(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tif stream.NonceSize() != len(metadata.Nonce) {\n\t\treturn nil, sio.NotAuthentic\n\t}\n\treturn stream.DecryptReader(ciphertext, metadata.Nonce, nil), nil\n}", "title": "" }, { "docid": "41c2ffa07427a1c2242691f186236b73", "score": "0.5007817", "text": "func (e *EncryptTool) Decrypt(data []byte) ([]byte, error) {\n\tif len(data) < CIPHER_KEY_LEN {\n\t\treturn nil, errors.New(\"Invalid Input\")\n\t}\n\tsalt, data := data[len(data)-CIPHER_KEY_LEN:], data[:len(data)-CIPHER_KEY_LEN]\n\tkey, _, err := e.DeriveKey(salt)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tblockCipher, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tgcm, err := cipher.NewGCM(blockCipher)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tnonce, ciphertext := data[:gcm.NonceSize()], data[gcm.NonceSize():]\n\tplaintext, err := gcm.Open(nil, nonce, ciphertext, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn plaintext, nil\n}", "title": "" }, { "docid": "87057367507daf3bda30ee0c1f4975b6", "score": "0.5004306", "text": "func (decryptor *decryptor) Decrypt(ciphertext *Ciphertext, plaintext *Plaintext) {\n\n\tringQ := decryptor.ringQ\n\n\tlevel := utils.MinInt(ciphertext.Level(), plaintext.Level())\n\n\tplaintext.Value.Coeffs = plaintext.Value.Coeffs[:level+1]\n\n\tif ciphertext.Value[0].IsNTT {\n\t\tring.CopyValuesLvl(level, ciphertext.Value[ciphertext.Degree()], plaintext.Value)\n\t} else {\n\t\tringQ.NTTLazyLvl(level, ciphertext.Value[ciphertext.Degree()], plaintext.Value)\n\t}\n\n\tfor i := ciphertext.Degree(); i > 0; i-- {\n\n\t\tringQ.MulCoeffsMontgomeryLvl(level, plaintext.Value, decryptor.sk.Value, plaintext.Value)\n\n\t\tif !ciphertext.Value[0].IsNTT {\n\t\t\tringQ.NTTLazyLvl(level, ciphertext.Value[i-1], decryptor.pool)\n\t\t\tringQ.AddLvl(level, plaintext.Value, decryptor.pool, plaintext.Value)\n\t\t} else {\n\t\t\tringQ.AddLvl(level, plaintext.Value, ciphertext.Value[i-1], plaintext.Value)\n\t\t}\n\n\t\tif i&7 == 7 {\n\t\t\tringQ.ReduceLvl(level, plaintext.Value, plaintext.Value)\n\t\t}\n\t}\n\n\tif (ciphertext.Degree())&7 != 7 {\n\t\tringQ.ReduceLvl(level, plaintext.Value, plaintext.Value)\n\t}\n\n\tif !plaintext.Value.IsNTT {\n\t\tringQ.InvNTTLvl(level, plaintext.Value, plaintext.Value)\n\t}\n}", "title": "" }, { "docid": "827c77fca3bf369563932420a5161260", "score": "0.5003978", "text": "func (s *Seal) Decrypt(_ context.Context, in *physical.EncryptedBlobInfo) (pt []byte, err error) {\n\tdefer func(now time.Time) {\n\t\tmetrics.MeasureSince([]string{\"seal\", \"decrypt\", \"time\"}, now)\n\t\tmetrics.MeasureSince([]string{\"seal\", \"transit\", \"decrypt\", \"time\"}, now)\n\n\t\tif err != nil {\n\t\t\tmetrics.IncrCounter([]string{\"seal\", \"decrypt\", \"error\"}, 1)\n\t\t\tmetrics.IncrCounter([]string{\"seal\", \"transit\", \"decrypt\", \"error\"}, 1)\n\t\t}\n\t}(time.Now())\n\n\tmetrics.IncrCounter([]string{\"seal\", \"decrypt\"}, 1)\n\tmetrics.IncrCounter([]string{\"seal\", \"transit\", \"decrypt\"}, 1)\n\n\tplaintext, err := s.client.Decrypt(in.Ciphertext)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn plaintext, nil\n}", "title": "" }, { "docid": "6ecc38a41be7f3259935c2b7ee80d691", "score": "0.49956164", "text": "func (nc *NewCipher) Decrypt(n uint64, ad, ciphertext []byte) ([]byte, error) {\n\t// nonce must be less than 2^64-1\n\tif n == noiseCipher.MaxNonce {\n\t\treturn nil, noiseCipher.ErrNonceOverflow\n\t}\n\n\tnonce := nc.EncodeNonce(n)\n\tplaintext, err := nc.Cipher().Open(nil, nonce, ciphertext, ad)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn plaintext, nil\n}", "title": "" }, { "docid": "a2bea96194fb1ba0518dc6f28923249f", "score": "0.49922857", "text": "func DecryptAES(key, text []byte) ([]byte, error) {\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(text) < aes.BlockSize {\n\t\treturn nil, errors.New(\"text too short\")\n\t}\n\n\tiv := text[:aes.BlockSize]\n\ttext = text[aes.BlockSize:]\n\tcfb := cipher.NewCFBDecrypter(block, iv)\n\tcfb.XORKeyStream(text, text)\n\n\treturn base64.StdEncoding.DecodeString(string(text))\n}", "title": "" }, { "docid": "cd93e8ce4dbb16d2807f78551b110cb8", "score": "0.49901962", "text": "func encrypt(in io.Reader, mode cipher.BlockMode) error {\n\tbuf, err := ioutil.ReadAll(in)\n\tif err != nil {\n\t\treturn err\n\t}\n\tbuf = PKCS7Pad(buf, mode.BlockSize())\n\tmode.CryptBlocks(buf, buf)\n\tfmt.Println(base64.StdEncoding.EncodeToString(buf))\n\n\treturn nil\n}", "title": "" }, { "docid": "934d8cc7dcb48ff554c57cf676d30923", "score": "0.49885812", "text": "func (service AesEncryptionService) Decrypt(data []byte) ([]byte, error) {\n\tblock, err := aes.NewCipher(service.secret)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tgcm, err := cipher.NewGCM(block)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tnonceSize := gcm.NonceSize()\n\tnonce, cipherText := data[:nonceSize], data[nonceSize:]\n\tplaintext, err := gcm.Open(nil, nonce, cipherText, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn plaintext, nil\n}", "title": "" }, { "docid": "a3e2f4add92a9060a9b5f34db8e26686", "score": "0.49785304", "text": "func (m *MonoAlphabetic) Decrypt(ciphertext string, key string) string {\n\tcipherPad := makeCipher(key)\n\tdecrypted := \"\"\n\n\tfor i := 0; i < len(ciphertext); i++ {\n\t\tidx := strings.Index(cipherPad, string(ciphertext[i]))\n\t\tdecrypted += string(alphabet[idx])\n\t}\n\n\treturn decrypted\n}", "title": "" }, { "docid": "60532207371e00c50297e11ebae771e9", "score": "0.49749586", "text": "func Decrypt(cbytes, password []byte) ([]byte, error) {\n\tlog.Tracef(\"Decrypt: %v, %v\", cbytes, password)\n\n\tc := New(password)\n\treturn c.Decrypt(cbytes)\n}", "title": "" }, { "docid": "e52b197739e762281aa1581ee553f4ba", "score": "0.4966913", "text": "func (e *CTR) Decrypt(ciphertext []byte) []byte {\n\treturn e.Encrypt(ciphertext)\n}", "title": "" }, { "docid": "f79d99b91a7c14de8b9b948f08703927", "score": "0.4966035", "text": "func Decrypt(raw []byte, opt *Options) (packageBuf []byte, err error) {\n\tdoc, err := mscfb.New(bytes.NewReader(raw))\n\tif err != nil {\n\t\treturn\n\t}\n\tencryptionInfoBuf, encryptedPackageBuf := extractPart(doc)\n\tmechanism, err := encryptionMechanism(encryptionInfoBuf)\n\tif err != nil || mechanism == \"extensible\" {\n\t\treturn\n\t}\n\tif mechanism == \"agile\" {\n\t\treturn agileDecrypt(encryptionInfoBuf, encryptedPackageBuf, opt)\n\t}\n\treturn standardDecrypt(encryptionInfoBuf, encryptedPackageBuf, opt)\n}", "title": "" }, { "docid": "ebfe0e1f4c09bcface91327a147b68ef", "score": "0.4956447", "text": "func (c *SerpentCipher) Decrypt(data []byte, password []byte) ([]byte, error) {\n\tsalt := data[len(data)-defaultSaltSize:]\n\n\tkey := pbkdf2.Key(password, salt, 4096, 32, sha256.New)\n\n\tblockCipher, err := serpent.NewCipher(key)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"creating block cipher\")\n\t}\n\n\tmodeCipher, err := cipher.NewGCM(blockCipher)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"creating block mode cipher\")\n\t}\n\n\tif len(data) < modeCipher.NonceSize() {\n\t\treturn nil, errors.New(\"malformed ciphertext\")\n\t}\n\n\tplaintext, err := modeCipher.Open(nil, data[:modeCipher.NonceSize()], data[modeCipher.NonceSize():len(data)-defaultSaltSize], nil)\n\tif err != nil {\n\t\treturn nil, errors.Wrapf(err, \"decrypting data\")\n\t}\n\n\treturn plaintext, nil\n}", "title": "" }, { "docid": "c92e8320cd76733758d28baaec56aad2", "score": "0.49541265", "text": "func Decrypt(p, q, e, c *big.Int) (string, error) {\n\tn := new(big.Int).Mul(p, q)\n\n\tphi := new(big.Int).Mul(\n\t\tnew(big.Int).Sub(p, big.NewInt(1)),\n\t\tnew(big.Int).Sub(q, big.NewInt(1)),\n\t)\n\n\td := new(big.Int).ModInverse(e, phi)\n\n\tdecrypted := new(big.Int).Exp(c, d, n).Bytes()\n\tif decrypted[0] != 0x02 {\n\t\treturn \"\", fmt.Errorf(\"Invalid preamble: %x\", decrypted[0])\n\t}\n\n\tmsgIndex := 0\n\tfor msgIndex = 0; msgIndex < len(decrypted); msgIndex++ {\n\t\tif decrypted[msgIndex] == 0x00 {\n\t\t\tmsgIndex++\n\t\t\tbreak\n\t\t}\n\t}\n\n\tmsg := decrypted[msgIndex:]\n\treturn fmt.Sprintf(\"%s\", msg), nil\n}", "title": "" }, { "docid": "81cceeef8e4df7c7519c2489f96ff5eb", "score": "0.49540684", "text": "func Decrypt(key []byte, cryptoText string) (string, error) {\n\tciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\treturn \"\", err\n\t}\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn fmt.Sprintf(\"%s\", ciphertext), nil\n}", "title": "" }, { "docid": "67f998e5ad942af05da1a72a4357b734", "score": "0.4946224", "text": "func PermissionedDecrypt(messageName protoreflect.Name, fieldName protoreflect.Name, text string) string {\n\n\tif isActionAllowed(messageName, fieldName, copying, getStackTrace()) {\n\t\treturn decrypt(text)\n\t}\n\n\treturn text\n}", "title": "" }, { "docid": "20f21b9fe0b39d703af439accf9ce445", "score": "0.49218503", "text": "func (e *ECcrypto) Decrypt(cipherText []byte) ([]byte, error) {\n\tif e.gcm == nil {\n\t\treturn nil, fmt.Errorf(\"Decrypt: gcm not initialized (gcm == nil)\")\n\t}\n\n\treturn e.gcm.Open(nil, e.nonce, cipherText, nil)\n}", "title": "" }, { "docid": "5fb453950d6ca0c400461ec7dfa6148c", "score": "0.49208447", "text": "func main() {\n println(\"Test AES crypto\");\n\n key := to_bytes(\"12345612345612345612345612345612\")\n msg := to_bytes(\"abcdefabcdefabcdefabcdefabcdefab\")\n \n crypt := encrypt(msg,key)\n clear := decrypt(crypt[0:],key)\n \n pretty(\"Key\", key)\n pretty(\"Message\", msg)\n pretty(\"Encrypted\", crypt[0:])\n pretty(\"Decrypted\", clear[0:])\n}", "title": "" }, { "docid": "ab5642c6cf7432994a0fbe6d214edca0", "score": "0.4919351", "text": "func Decrypt(key []byte, cryptoText string) (string, bool) {\n\tciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\tlog.Println(err)\n\t\treturn \"\", false\n\t}\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\tlog.Println(\"ciphertext too short\")\n\t\treturn \"\", false\n\t}\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn fmt.Sprintf(\"%s\", ciphertext), true\n}", "title": "" }, { "docid": "2e67aa394d9635905a92edc734e9e34e", "score": "0.4904554", "text": "func (t *Thread) Decrypt(data []byte) ([]byte, error) {\n\treturn crypto.Decrypt(t.PrivKey, data)\n}", "title": "" }, { "docid": "ce291652816941543c71dc6b87a39f45", "score": "0.4903881", "text": "func (encryption *Kerberos) Decrypt(buffer []byte) []byte {\n\tif !encryption.Validate(buffer) {\n\t\tfmt.Println(\"INVALID KERB CHECKSUM\")\n\t}\n\n\toffset := len(buffer)\n\toffset = offset + -0x10\n\n\tdata := buffer[:offset]\n\n\tRC4, _ := rc4.NewCipher([]byte(encryption.Key))\n\n\tcrypted := make([]byte, len(data))\n\tRC4.XORKeyStream(crypted, data)\n\n\treturn crypted\n}", "title": "" }, { "docid": "408db523a462ad8eb87e9938449c3068", "score": "0.4903301", "text": "func encrypt(plainText string, key string) (secretText string, err error) {\n\tiv := []byte(_IV)\n\tvar block cipher.Block\n\tif block, err = aes.NewCipher([]byte(key)); err != nil {\n\t\tlog.Println(err)\n\t\treturn\n\t}\n\tencrypt := cipher.NewCBCEncrypter(block, iv)\n\tvar source = pkcs5pad([]byte(plainText), 16)\n\tvar dst = make([]byte, len(source))\n\tencrypt.CryptBlocks(dst, source)\n\tsecretText = base64.StdEncoding.EncodeToString(dst)\n\treturn\n}", "title": "" }, { "docid": "1d683b44e8dcaef3e0c02f577bbcdf7c", "score": "0.49008727", "text": "func decryptFile(filename string, outFilename string, sha256Bytes []byte) (string, error) {\n\tif len(outFilename) == 0 {\n\t\toutFilename = filename + \".dec\"\n\t}\n\n\tciphertext, err := ioutil.ReadFile(filename)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tof, err := os.Create(outFilename)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer of.Close()\n\n\t// cipertext has the original plaintext size in the first 8 bytes, then IV\n\t// in the next 16 bytes, then the actual ciphertext in the rest of the buffer.\n\t// Read the original plaintext size, and the IV.\n\tvar origSize uint64\n\tbuf := bytes.NewReader(ciphertext)\n\tif err = binary.Read(buf, binary.LittleEndian, &origSize); err != nil {\n\t\treturn \"\", err\n\t}\n\tiv := make([]byte, aes.BlockSize)\n\tif _, err = buf.Read(iv); err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// The remaining ciphertext has size=paddedSize.\n\tpaddedSize := len(ciphertext) - 8 - aes.BlockSize\n\tif paddedSize%aes.BlockSize != 0 {\n\t\treturn \"\", fmt.Errorf(\"want padded plaintext size to be aligned to block size\")\n\t}\n\tplaintext := make([]byte, paddedSize)\n\n\tblock, err := aes.NewCipher(sha256Bytes)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tmode := cipher.NewCBCDecrypter(block, iv)\n\tmode.CryptBlocks(plaintext, ciphertext[8+aes.BlockSize:])\n\n\tif _, err := of.Write(plaintext[:origSize]); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn outFilename, nil\n}", "title": "" }, { "docid": "12dfdb288b310c15ab3ca8c6dac07d69", "score": "0.48960763", "text": "func Decrypt(data, key []byte) ([]byte, error) {\n\tif len(data) < aes.BlockSize {\n\t\treturn nil, fmt.Errorf(\"cipherText too short. It decodes to %v bytes but the minimum length is 16\", len(data))\n\t}\n\t// split the input up in to the IV seed and then the actual encrypted data.\n\tiv := data[:aes.BlockSize]\n\tdata = data[aes.BlockSize:]\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\tstream.XORKeyStream(data, data)\n\treturn data, nil\n}", "title": "" }, { "docid": "3a6eecbc98759cc9849a31312d41606a", "score": "0.48855636", "text": "func Encrypt(password string, inFilePath string, outFilePath string) (string, error) {\n\tif len(outFilePath) == 0 {\n\t\treturn \"\", fmt.Errorf(\"Can't leave output filename path empty\")\n\t}\n\n\t// get key and salt from given password\n\tkey, salt, err := getKey(password, nil)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// read plaintext from the given file\n\tplaintext, err := ioutil.ReadFile(inFilePath)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// create the output file\n\toutFile, err := os.Create(outFilePath)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tdefer outFile.Close()\n\n\t// write size of original file to the encrypted file\n\ttextSize := uint64(len(plaintext))\n\tif err = binary.Write(outFile, binary.LittleEndian, textSize); err != nil {\n\t\treturn \"\", nil\n\t}\n\n\t// write the generated salt to the encrypted file (used for decryption)\n\tif _, err = outFile.Write(salt); err != nil {\n\t\treturn \"\", nil\n\t}\n\n\t// generate random IV and write to encrypted file\n\tiv := make([]byte, aes.BlockSize)\n\tif _, err := rand.Read(iv); err != nil {\n\t\treturn \"\", err\n\t}\n\tif _, err = outFile.Write(iv); err != nil {\n\t\treturn \"\", err\n\t}\n\n\t// pad the plaintext to a multiple of aes.Blocksize\n\tif len(plaintext)%aes.BlockSize != 0 {\n\t\tbytesDiff := aes.BlockSize - (len(plaintext) % aes.BlockSize)\n\t\tpadding := make([]byte, bytesDiff)\n\t\tif _, err := rand.Read(padding); err != nil {\n\t\t\treturn \"\", nil\n\t\t}\n\t\tplaintext = append(plaintext, padding...)\n\t}\n\n\t// ciphertext is of same size as plaintext\n\tciphertext := make([]byte, len(plaintext))\n\n\t// Use AES implementation of the cipher.Block interface to\n\t// encrypt the whole file in CBC mode.\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\tmode := cipher.NewCBCEncrypter(block, iv)\n\tmode.CryptBlocks(ciphertext, plaintext)\n\n\tif _, err = outFile.Write(ciphertext); err != nil {\n\t\treturn \"\", err\n\t}\n\treturn outFilePath, nil\n}", "title": "" }, { "docid": "615bdc88018177a3774cd4ac27e4716a", "score": "0.488518", "text": "func (de *PlaintextEncryptor) Decrypt(ciphertext, appName string) (string, error) {\n\tif ciphertext == \"\" {\n\t\treturn \"\", fmt.Errorf(\"decrypted value is empty\")\n\t}\n\n\treturn ciphertext, nil\n}", "title": "" }, { "docid": "5599691124727a7e1ea9a58bd6ed8012", "score": "0.4878537", "text": "func (handle *ContextHandle) Decrypt(session mPkcs11.SessionHandle, cypher []byte) ([]byte, error) {\n\n\thandle.lock.RLock()\n\tdefer handle.lock.RUnlock()\n\n\te := handle.isInRecovery()\n\tif e != nil {\n\t\treturn nil, e\n\t}\n\n\treturn handle.ctx.Decrypt(session, cypher)\n}", "title": "" }, { "docid": "d5720f86e452d242ccca7d845dbb0ea7", "score": "0.48708865", "text": "func (s *Storage) Decrypt() {\n\tencryptedData, err := ioutil.ReadFile(s.File)\n\tutil.Check(err)\n\tdecodedData, _ := base64.StdEncoding.DecodeString(string(encryptedData))\n\n\tiv := decodedData[:aes.BlockSize]\n\tdecodedData = decodedData[aes.BlockSize:]\n\n\tblock, err := aes.NewCipher(s.Password)\n\tutil.Check(err)\n\n\tif len(decodedData)%aes.BlockSize != 0 {\n\t\tpanic(\"ciphertext is not a multiple of the block size\")\n\t}\n\n\tmode := cipher.NewCBCDecrypter(block, iv)\n\tmode.CryptBlocks(decodedData, decodedData)\n\n\ts.parse(decodedData)\n}", "title": "" }, { "docid": "f2b049c2d7899e8d2f98f3fbe31071ea", "score": "0.48669198", "text": "func (cl *KMSClient) KmsDecryptText(text string) ([]byte, error) {\n\tblob, err := base64.StdEncoding.DecodeString(text)\n\tif err != nil {\n\t\treturn []byte{}, fmt.Errorf(\"Error in decode base64 encrypted data: %w\", err)\n\t}\n\n\tresult, err := cl.Client.Decrypt(context.TODO(), &kms.DecryptInput{CiphertextBlob: blob})\n\n\tif err != nil {\n\t\treturn []byte{}, fmt.Errorf(\"Error in decrypt data by AWS KMS: %w\", err)\n\t}\n\n\treturn result.Plaintext, nil\n}", "title": "" }, { "docid": "12b354d680f0431c0ea7d806d88d2653", "score": "0.4866829", "text": "func (gck *GCMCipherKey) Decrypt(cipherText []byte) ([]byte, error) {\n\tgcm, err := gck.newGCM()\n\tif err != nil {\n\t\treturn nil, nil\n\t}\n\t// First part of cipherText is nonce, and rest is cipherText\n\tnonceSize := gcm.NonceSize()\n\tif len(cipherText) < nonceSize {\n\t\treturn nil, fmt.Errorf(\"decrypt error: cipherText has length %v smaller than nonce %v\", len(cipherText),\n\t\t\tnonceSize)\n\t}\n\tnonce, cipherText := cipherText[:nonceSize], cipherText[nonceSize:]\n\t// Decrypt\n\treturn gcm.Open(nil, nonce, cipherText, nil)\n}", "title": "" }, { "docid": "a6afe19bfe222ad5aa5fe39a938e2203", "score": "0.48627153", "text": "func encrypt(key, text []byte) ([]byte, error) {\r\n\tblock, err := aes.NewCipher(key)\r\n\tif err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\tb := base64.StdEncoding.EncodeToString(text)\r\n\tciphertext := make([]byte, aes.BlockSize+len(b))\r\n\tiv := ciphertext[:aes.BlockSize]\r\n\tif _, err := io.ReadFull(rand.Reader, iv); err != nil {\r\n\t\treturn nil, err\r\n\t}\r\n\tcfb := cipher.NewCFBEncrypter(block, iv)\r\n\tcfb.XORKeyStream(ciphertext[aes.BlockSize:], []byte(b))\r\n\treturn ciphertext, nil\r\n}", "title": "" }, { "docid": "d6a2ac86d7198571470fc866aeb5c5ab", "score": "0.48621637", "text": "func (b *box) Decrypt(ciphertext []byte) (plaintext []byte, err error) {\n\tdefer func() {\n\t\t// secretbox Open panics for invalid input\n\t\tif recover() != nil {\n\t\t\terr = errors.New(\"symmetric key decryption failed\")\n\t\t}\n\t}()\n\n\tvar nonce [NonceSize]byte\n\tcopy(nonce[:], ciphertext[:NonceSize])\n\n\tplaintext, ok := secretbox.Open(nil, ciphertext[NonceSize:], &nonce, &b.key)\n\tif !ok {\n\t\terr = fmt.Errorf(\"symmetric key decryption failed\")\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "6702df0805431030a50bf94dc0474f50", "score": "0.4862045", "text": "func (a *aesDecryptor) Decrypt(cipherText, key, aad []byte) []byte {\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\twrittenCiphertextLen := binary.LittleEndian.Uint32(cipherText)\n\tcipherLen := writtenCiphertextLen + bufferSizeLength\n\tnonce := cipherText[bufferSizeLength : bufferSizeLength+NonceLength]\n\n\tif a.mode == gcmMode {\n\t\taead, err := cipher.NewGCM(block)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\n\t\tplain, err := aead.Open(nil, nonce, cipherText[bufferSizeLength+NonceLength:cipherLen], aad)\n\t\tif err != nil {\n\t\t\tpanic(err)\n\t\t}\n\t\treturn plain\n\t}\n\n\t// Parquet CTR IVs are comprised of a 12-byte nonce and a 4-byte initial\n\t// counter field.\n\t// The first 31 bits of the initial counter field are set to 0, the last bit\n\t// is set to 1.\n\tiv := make([]byte, ctrIVLen)\n\tcopy(iv, nonce)\n\tiv[ctrIVLen-1] = 1\n\n\tstream := cipher.NewCTR(block, iv)\n\tdst := make([]byte, len(cipherText)-bufferSizeLength-NonceLength)\n\tstream.XORKeyStream(dst, cipherText[bufferSizeLength+NonceLength:])\n\treturn dst\n}", "title": "" }, { "docid": "ad8749d419d9b9580de2a1fd1c55d619", "score": "0.4861763", "text": "func (pf Playfair) Decrypt(ciphertext string, key string) (string, error) {\n\tif err := validateCiphertext(ciphertext); err != nil {\n\t\treturn \"\", err\n\t}\n\tkb := newKeyblock(key)\n\treturn pf.process(ciphertext, kb, true), nil\n}", "title": "" }, { "docid": "f85120866e95c7d71a670e4f8908fee2", "score": "0.48612916", "text": "func decrypt(block cipher.Block, value []byte) ([]byte, error) {\n\tsize := block.BlockSize()\n\tif len(value) > size {\n\t\t// Extract iv.\n\t\tiv := value[:size]\n\t\t// Extract ciphertext.\n\t\tvalue = value[size:]\n\t\t// Decrypt it.\n\t\tstream := cipher.NewCTR(block, iv)\n\t\tstream.XORKeyStream(value, value)\n\t\treturn value, nil\n\t}\n\treturn nil, errors.New(\"decrypt: the value could not be decrypted\")\n}", "title": "" }, { "docid": "c6bc0cdb56b107b121ba9cc797cd60c2", "score": "0.4859476", "text": "func Decrypt(params *Params, key *PrivateKey, cipher *Cipher) *bn256.GT {\n\t/*println(\"begin decrypt\")\n\tprintln(\"cipher\")\n\tprintln(cipher.cipherlist)\n\tfor i, tmp := range cipher.cipherlist {\n\t\tprintln(\"go %d\", i)\n\t\tfor j := range tmp.nodeID {\n\t\t\tprintln(tmp.nodeID[j])\n\t\t}\n\t\tprintln(\"index\")\n\t\tprintln(*tmp.indexI)\n\t\tprintln(*tmp.indexJ)\n\t}*/\n\tplaintext := treeDecrypt(params, key.root, cipher, 1, *params.userSize) //, nodeID, 0)\n\t//println(plaintext)\n\treturn plaintext\n}", "title": "" }, { "docid": "063c6539b986451a38a7022e00d2e69c", "score": "0.48527333", "text": "func (v *Vault) TransitDecrypt(ctx context.Context, key, cipherText string) (data []byte, err error) {\n\tpath := fmt.Sprintf(\"/%s/decrypt/%s\", v.Config.TransitEngine, key)\n\ttrimmedCipher := strings.TrimSpace(cipherText)\n\tbody := decryptRequest{\n\t\tCiphertext: trimmedCipher,\n\t}\n\treqBody, err := json.Marshal(body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treq, err := v.requestGen(ctx, http.MethodPost, path, bytes.NewBuffer(reqBody))\n\tif err != nil {\n\t\treturn\n\t}\n\tres, err := v.Config.HTTPClient.Do(req)\n\tif err != nil {\n\t\treturn\n\t}\n\tdefer res.Body.Close()\n\tif err := checkErrorResponse(res); err != nil {\n\t\treturn nil, err\n\t}\n\tvar response decryptResponse\n\tjson.NewDecoder(res.Body).Decode(&response)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ts, err := base64.StdEncoding.DecodeString(response.Data.Plaintext)\n\tif err != nil {\n\t\treturn data, errors.New(\"Fail to decode payload\")\n\t}\n\ttrimmed := strings.TrimSpace(string(s))\n\treturn []byte(trimmed), nil\n}", "title": "" }, { "docid": "168bd9d5f398e4009e1b64a4e9545680", "score": "0.48497188", "text": "func (c *Cipher) Decrypt(key, ciphertext []byte) ([]byte, error) {\n\treturn Decrypt(key, ciphertext)\n}", "title": "" }, { "docid": "9617b5fd71bd3f83145f7641172d30d1", "score": "0.4845397", "text": "func (d *Device) Decrypt(ciphertext []byte) (plaintext []byte, err error) {\r\n\r\n\tlabel := []byte(\"record\")\r\n\trng := rand.Reader\r\n\r\n\t// Verify π: R in H'\r\n\r\n\t// Verify ρ: H' extends H\r\n\r\n\t// result := dec(dk, R)\r\n\r\n\tif RSAOAEP == true {\r\n\r\n\t\tplaintext, err = rsa.DecryptOAEP(sha256.New(), rng, d.decKey, ciphertext, label)\r\n\t\tif err != nil {\r\n\t\t\tlog.Printf(\"Error from OAEP decryption: %s\\n\", err)\r\n\t\t}\r\n\r\n\t} else {\r\n\r\n\t\tplaintext, err = rsa.DecryptPKCS1v15(rng, d.decKey, ciphertext)\r\n\t\tif err != nil {\r\n\t\t\tlog.Printf(\"Error from PKCS1v15 decryption: %s\\n\", err)\r\n\t\t}\r\n\t}\r\n\r\n\t// H := H'\r\n\treturn plaintext, err\r\n}", "title": "" }, { "docid": "b6ca411755cda7ef68ab17a943c5d19c", "score": "0.4838642", "text": "func decrypt(ctx *context.T, adinfo *AdInfo) error {\n\tif adinfo.EncryptionAlgorithm == NoEncryption {\n\t\t// Not encrypted.\n\t\treturn nil\n\t}\n\n\tif adinfo.EncryptionAlgorithm != IbeEncryption {\n\t\treturn fmt.Errorf(\"unsupported encryption algorithm: %v\", adinfo.EncryptionAlgorithm)\n\t}\n\n\tvar sharedKey *[32]byte\n\tvar err error\n\tfor _, key := range adinfo.EncryptionKeys {\n\t\tif sharedKey, err = unwrapSharedKey(ctx, key); err == nil {\n\t\t\tbreak\n\t\t}\n\t}\n\tif sharedKey == nil {\n\t\treturn errNoPermission\n\t}\n\n\t// We only encrypt addresses for now.\n\t//\n\t// Note that we should not modify the slice element directly here since the\n\t// underlying plugins may cache advertisements and the next plugin.Scan()\n\t// may return the already decrypted addresses.\n\tdecrypted := make([]string, len(adinfo.Ad.Addresses))\n\tfor i, encrypted := range adinfo.Ad.Addresses {\n\t\tvar n [24]byte\n\t\tbinary.LittleEndian.PutUint64(n[:], uint64(i))\n\t\taddr, ok := secretbox.Open(nil, []byte(encrypted), &n, sharedKey)\n\t\tif !ok {\n\t\t\treturn errors.New(\"decryption error\")\n\t\t}\n\t\tdecrypted[i] = string(addr)\n\t}\n\tadinfo.Ad.Addresses = decrypted\n\treturn nil\n}", "title": "" }, { "docid": "737c5bd8ecfad0277d2f380c055c9afb", "score": "0.4837679", "text": "func main() {\n\targsWithoutProg := os.Args[1:]\n\tif len((argsWithoutProg))!=3{\n\t\tlog.Fatal(\"need 3 parameter\")\n\t\treturn\n\t}\n\t// Load your secret key from a safe place and reuse it across multiple\n\t// NewCipher calls. (Obviously don't use this example key for anything\n\t// real.) If you want to convert a passphrase to a key, use a suitable\n\t// package like bcrypt or scrypt.\n\tkey, err := hex.DecodeString(argsWithoutProg[0])\n\tif err!=nil{\n\t\tlog.Fatalln(err)\n\t}\n\n\tinFile, err := os.Open(argsWithoutProg[1])\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t\tpanic(err)\n\t}\n\tdefer inFile.Close()\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t\tpanic(err)\n\t}\n\n\t// If the key is unique for each ciphertext, then it's ok to use a zero\n\t// IV.\n\tvar iv [aes.BlockSize]byte\n\tstream := cipher.NewOFB(block, iv[:])\n\n\toutFile, err := os.OpenFile(argsWithoutProg[2], os.O_WRONLY|os.O_CREATE|os.O_TRUNC, 0600)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t\tpanic(err)\n\t}\n\tdefer outFile.Close()\n\n\treader := &cipher.StreamReader{S: stream, R: inFile}\n\t// Copy the input file to the output file, decrypting as we go.\n\tif _, err := io.Copy(outFile, reader); err != nil {\n\t\tlog.Fatalln(err)\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "6837680c5e7c1877d944d29e787b1646", "score": "0.48271424", "text": "func (c *AESBase64Cipher) Decrypt(cryptoText string) []byte {\n\tciphertext, _ := base64.URLEncoding.DecodeString(cryptoText)\n\n\t// The IV needs to be unique, but not secure. Therefore it's common to\n\t// include it at the beginning of the ciphertext.\n\tif len(ciphertext) < aes.BlockSize {\n\t\tpanic(\"ciphertext too short\")\n\t}\n\tiv := ciphertext[:aes.BlockSize]\n\tciphertext = ciphertext[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(c.block, iv)\n\n\t// XORKeyStream can work in-place if the two arguments are the same.\n\tstream.XORKeyStream(ciphertext, ciphertext)\n\n\treturn ciphertext\n}", "title": "" }, { "docid": "bb9240c3ad7f9ceff30963ebd568b29d", "score": "0.4820762", "text": "func Decrypt(cipherString string) ([]byte, error) {\n\tcipherText, err := base64.StdEncoding.DecodeString(cipherString)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif len(cipherText) < aes.BlockSize {\n\t\treturn nil, errors.New(\"ciphertext block size is too short\")\n\t}\n\tiv := cipherText[:aes.BlockSize]\n\tcipherText = cipherText[aes.BlockSize:]\n\n\tstream := cipher.NewCFBDecrypter(block, iv)\n\n\tstream.XORKeyStream(cipherText, cipherText)\n\treturn cipherText, nil\n}", "title": "" }, { "docid": "cf1833afbd0c8003153bf91c44a99788", "score": "0.48151794", "text": "func DecryptCipher(cipherText string, password string) (string, error) {\n\treturn cryptutil.DecryptBase64ToString(cipherText, password)\n}", "title": "" }, { "docid": "ef864aa345b7996463a84abd2be9c58f", "score": "0.48134783", "text": "func Encrypt(key, text []byte) ([]byte, error) {\n\tblock, err := aes.NewCipher(key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tb := base64.StdEncoding.EncodeToString(text)\n\tciphertext := make([]byte, aes.BlockSize+len(b))\n\tiv := ciphertext[:aes.BlockSize]\n\tif _, err := io.ReadFull(rand.Reader, iv); err != nil {\n\t\treturn nil, err\n\t}\n\tcfb := cipher.NewCFBEncrypter(block, iv)\n\tcfb.XORKeyStream(ciphertext[aes.BlockSize:], []byte(b))\n\treturn ciphertext, nil\n}", "title": "" }, { "docid": "8779d7d97a3aab715ecce23bb50cda1c", "score": "0.48122895", "text": "func (crypto *Crypto) Decrypt(encbytes []byte) ([]byte, error) {\n\tif log.Level() == btclog.TraceLvl {\n\t\tlog.Tracef(\"Decrypt: %v\",\n\t\t\tbase64.StdEncoding.EncodeToString(encbytes))\n\t}\n\n\tctype, cbytes, err := crypto.prepareDecipher(encbytes)\n\tif err == nil {\n\t\tif log.Level() == btclog.TraceLvl {\n\t\t\tlog.Tracef(\"ctype=%v\", ctype)\n\t\t\tlog.Tracef(\"base64(cbytes)=%v\", base64.StdEncoding.EncodeToString(cbytes))\n\t\t}\n\n\t\tcrypto.Type = ctype\n\t\treturn crypto.decryptAES256withCBC(cbytes)\n\t}\n\n\treturn nil, fmt.Errorf(\"fail to decrypt: %v\", err)\n}", "title": "" }, { "docid": "dd78754502f53f9acf4d5978eb712877", "score": "0.48122334", "text": "func encrypt(in io.Reader, c cipher.Block) error {\n\tbuf, err := ioutil.ReadAll(in)\n\tif err != nil {\n\t\treturn err\n\t}\n\tbuf = PKCS7Pad(buf, c.BlockSize())\n\tNewECBEncrypter(c).CryptBlocks(buf, buf)\n\tfmt.Println(base64.StdEncoding.EncodeToString(buf))\n\n\treturn nil\n}", "title": "" }, { "docid": "48a3f0b0147d3a5d0549bd328f1fb1b6", "score": "0.48118442", "text": "func (cc *Client) Decrypt(gid string, content []byte) ([]byte, error) {\n\terr := cc.cryptCheck()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tk, err := cc.keyForID(gid)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tid, err := sasquatch.NewScryptIdentity(k.Key)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tr, err := sasquatch.Decrypt(bytes.NewReader(content), id)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn ioutil.ReadAll(r)\n}", "title": "" }, { "docid": "642c372c7fa4906c5218c3baea84880d", "score": "0.48086137", "text": "func (k *Kms) Decrypt(keyCiphertext []byte, secretID string) ([]byte, error) {\n\tdo, err := k.client.Decrypt(&kms.DecryptInput{\n\t\tEncryptionContext: aws.StringMap(map[string]string{\n\t\t\t\"SecretId\": secretID,\n\t\t}),\n\t\tCiphertextBlob: keyCiphertext,\n\t})\n\treturn do.Plaintext, err\n}", "title": "" } ]
3d69fbf04e234f3f7f882acbcddd7d01
newDonut creates a demo Donut widget.
[ { "docid": "6942d92e3efbff8d9507fbd5e1d4b6e4", "score": "0.69998324", "text": "func newDonut(ctx context.Context) (*donut.Donut, error) {\n\td, err := donut.New(donut.CellOpts(\n\t\tcell.FgColor(cell.ColorNumber(33))),\n\t)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconst start = 35\n\tprogress := start\n\n\tgo periodic(ctx, 500*time.Millisecond, func() error {\n\t\tif err := d.Percent(progress); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprogress++\n\t\tif progress > 100 {\n\t\t\tprogress = start\n\t\t}\n\t\treturn nil\n\t})\n\treturn d, nil\n}", "title": "" } ]
[ { "docid": "848abd12fb710e68d7088690ba7186ee", "score": "0.58640033", "text": "func NewDonut(donutName string, nodeDiskMap map[string][]string) (Donut, error) {\n\tif donutName == \"\" || len(nodeDiskMap) == 0 {\n\t\treturn nil, iodine.New(InvalidArgument{}, nil)\n\t}\n\tnodes := make(map[string]Node)\n\tbuckets := make(map[string]bucket)\n\td := donut{\n\t\tname: donutName,\n\t\tnodes: nodes,\n\t\tbuckets: buckets,\n\t}\n\tfor k, v := range nodeDiskMap {\n\t\tif len(v) == 0 {\n\t\t\treturn nil, iodine.New(InvalidDisksArgument{}, nil)\n\t\t}\n\t\terr := d.attachDonutNode(k, v)\n\t\tif err != nil {\n\t\t\treturn nil, iodine.New(err, nil)\n\t\t}\n\t}\n\treturn d, nil\n}", "title": "" }, { "docid": "115dcc0d99c3f4ba1532c45bf97405b5", "score": "0.5139922", "text": "func newDrugMutation(c config, op Op, opts ...drugOption) *DrugMutation {\n\tm := &DrugMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeDrug,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "063c21fe7d4ca4bbfea12bd3c637329c", "score": "0.51183575", "text": "func NewPagerDuty(c *config.PagerdutyConfig, t *template.Template, l log.Logger) *PagerDuty {\n\treturn &PagerDuty{conf: c, tmpl: t, logger: l}\n}", "title": "" }, { "docid": "473960ac4cbf27480e7255bf11063928", "score": "0.50022435", "text": "func NewDrinkable(x, y float64, img *render.Sprite) *Consumable {\n\tc := NewConsumable(x, y, img)\n\tc.cLabel = labels.Drinkable\n\tgo timing.DoAfter(40 * time.Second, func() {\n\t\tc.cLabel = 0\n\t\tc.Destroy()\n\t\tc.R.Undraw()\n\t})\n\treturn c\n}", "title": "" }, { "docid": "c6778f2b9dd7ce65c5c52efd4466fb0a", "score": "0.49487603", "text": "func NewWidget(ses *discordgo.Session, channelID string, embed *discordgo.MessageEmbed) *Widget {\n\treturn &Widget{\n\t\tChannelID: channelID,\n\t\tSes: ses,\n\t\tKeys: []string{},\n\t\tHandlers: map[string]WidgetHandler{},\n\t\tClose: make(chan bool),\n\t\tDeleteReactions: true,\n\t\tEmbed: embed,\n\t}\n}", "title": "" }, { "docid": "5d083934f454309b1f50002525a2b7b8", "score": "0.49295783", "text": "func newSUT() *provider {\n\treturn New()\n}", "title": "" }, { "docid": "2f753c73c93f4384400bf0fcf424e1d0", "score": "0.4877522", "text": "func newSUT(kind string, client client.Contract) *instance {\n\treturn New(kind, client)\n}", "title": "" }, { "docid": "6aeebf213b8108f93b27d217ada8e3ab", "score": "0.4872998", "text": "func NewDASHBOARD(config configuration.CONFIGURATION) *DASHBOARD_IMPL {\r\n client := new(DASHBOARD_IMPL)\r\n client.config = config\r\n return client\r\n}", "title": "" }, { "docid": "6f4a2fbc66bb5c1b8c39e0827dadfcc7", "score": "0.48357192", "text": "func NewBotDuck() string {\n\treturn \"DuckDuckBot/1.1; (+http://duckduckgo.com/duckduckbot.html)\"\n}", "title": "" }, { "docid": "3c50a64693042a2182bbe7e621ca9338", "score": "0.4698192", "text": "func newGauge(ctx context.Context) (*gauge.Gauge, error) {\n\tg, err := gauge.New()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tconst start = 35\n\tprogress := start\n\n\tgo periodic(ctx, 2*time.Second, func() error {\n\t\tif err := g.Percent(progress); err != nil {\n\t\t\treturn err\n\t\t}\n\t\tprogress++\n\t\tif progress > 100 {\n\t\t\tprogress = start\n\t\t}\n\t\treturn nil\n\t})\n\treturn g, nil\n}", "title": "" }, { "docid": "dff9799e179c9748db8117cb80b3acce", "score": "0.46929196", "text": "func newBriefingPanel(app *App) *BriefingPanel {\n\tbriefingText := strings.Replace(app.Briefing, \"\\n\", \"\\n\\n\", -1)\n\th := &BriefingPanel{\n\t\tapp: app,\n\t\tHeader: widget.NewLabelWithStyle(\n\t\t\t\"Briefing for: \"+strings.Join(app.Commanders, \", \"),\n\t\t\tfyne.TextAlignCenter, fyne.TextStyle{Bold: true}),\n\t\tNotes: widget.NewLabel(briefingText),\n\t}\n\timg := canvas.NewImageFromResource(resourceBannerJpg)\n\timg.FillMode = canvas.ImageFillOriginal\n\th.Box = widget.NewVBox(\n\t\timg,\n\t\th.Header,\n\t\th.Notes,\n\t)\n\th.Scroll = widget.NewScrollContainer(h.Box)\n\th.Scroll.Resize(app.MinSize())\n\th.Box.Show()\n\treturn h\n}", "title": "" }, { "docid": "cc4a976f274ece5563efdabf55323987", "score": "0.4678871", "text": "func newDentistMutation(c config, op Op, opts ...dentistOption) *DentistMutation {\n\tm := &DentistMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeDentist,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "8c8d45143fd228501ce34601871b846c", "score": "0.46548903", "text": "func newDefaultSUT() *instance {\n\treturn NewDefault()\n}", "title": "" }, { "docid": "37d407e5a7e43650f6cbdf613459c1ae", "score": "0.46397215", "text": "func New(databus types.Databus, messageHandler MessageHandler) (Databus, error) {\n\tswitch databus.Type {\n\tcase \"mqtt\":\n\t\tmqttServer := databus.GetConfig(\"connection_string\", \"tcp://localhost:1883\")\n\t\ttopic := databus.GetConfig(\"topic\", \"#\")\n\t\treturn mqtt.New(mqttServer, topic, messageHandler), nil\n\tdefault:\n\t\treturn nil, fmt.Errorf(\"%s is not a valid databus type. valid values are 'mqtt'\", databus.Type)\n\t}\n}", "title": "" }, { "docid": "49a5b99244286eac25758de2a8fc0cbb", "score": "0.46389392", "text": "func New(b *beat.Beat, cfg *common.Config) (beat.Beater, error) {\n\tconfig := config.DefaultConfig\n\tif err := cfg.Unpack(&config); err != nil {\n\t\treturn nil, fmt.Errorf(\"Error reading config file: %v\", err)\n\t}\n\n\tbt := &Nvidiagpubeat{\n\t\tdone: make(chan struct{}),\n\t\tconfig: config,\n\t}\n\treturn bt, nil\n}", "title": "" }, { "docid": "99a150f953727feaa48aa3083677a45b", "score": "0.46311298", "text": "func NewDosingPump(index int) DosingPump {\n\tvar pump DosingPump\n\tpump.Channel = index\n\tpump.Type = DosingPumpType\n\tpump.Units = \"ml/day\"\n\tpump.ID = GetID(DosingPumpType, index)\n\treturn pump\n}", "title": "" }, { "docid": "ca35bafb9a15f9a943465a373d20f341", "score": "0.46253446", "text": "func newSUT(publisherFactories []factory.Contract) *instance {\n\treturn New(publisherFactories)\n}", "title": "" }, { "docid": "16a10c0970a9b1c64f946fcc4687aa11", "score": "0.46170002", "text": "func newSyncedDemos(ctx context.Context, repoURL, branch, checkoutDir, demoPath string) *syncedDemos {\n\tsklog.Infof(\"Creating new syncedDemos for %s at %s\", repoURL, checkoutDir)\n\ts := &syncedDemos{\n\t\tbranch: branch,\n\t\trepoURL: repoURL,\n\t}\n\tvar err error\n\ts.repo, err = git.NewCheckout(ctx, repoURL, checkoutDir)\n\tif err != nil {\n\t\tsklog.Fatal(err)\n\t}\n\ts.demoPath = filepath.Join(s.repo.Dir(), demoPath)\n\tsklog.Infof(\"Serving demos out of '%s'\", s.demoPath)\n\n\tgo util.RepeatCtx(ctx, repoPollInterval, s.Sync)\n\treturn s\n}", "title": "" }, { "docid": "c29da4824fa3a2b08d024612afb2299a", "score": "0.46168068", "text": "func newNurseMutation(c config, op Op, opts ...nurseOption) *NurseMutation {\n\tm := &NurseMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeNurse,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "2e60722b2e649feb5b77163e4deb6cda", "score": "0.46094903", "text": "func NewTickerPlant(url url.URL) (*TickerPlant, error) {\n\tlog.Printf(\"Connecting to %s\", url.String())\n\tconn, _, err := websocket.DefaultDialer.Dial(url.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// Create login request\n\tconn.WriteMessage(websocket.BinaryMessage, requestLogin())\n\n\t// Read login response (blocking)\n\t_, binary, err := conn.ReadMessage()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\ttemplateID, err := DecodeBytes(binary)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tswitch templateID {\n\tcase 11:\n\t\tresponseLogin := rti.ResponseLogin{}\n\t\tproto.Unmarshal(binary[4:], &responseLogin)\n\t\tif responseLogin.RpCode[0] != \"0\" {\n\t\t\treturn nil, errors.New(fmt.Sprintf(\"Login request failed with error: %s\\n\", responseLogin.RpCode[1]))\n\t\t}\n\t}\n\n\treturn &TickerPlant{\n\t\tconn: conn,\n\t\tIsClosed: false,\n\t\tOrderBookSubscription: make(map[string]chan market.OrderBook),\n\t\tTradeSubscription: make(map[string]chan market.LastTrade),\n\t\tDepthSubscription: make(map[string]chan market.DepthByOrder),\n\t}, nil\n}", "title": "" }, { "docid": "5f3782a9bab543f8e047eb393ae09a28", "score": "0.46013075", "text": "func instantiateDemo(pctx *processContext, moduleRoot, demo string, force bool) error {\n\tpctx.Logf(\"Adding %q...\", demo)\n\n\t// Copy a single file, holding the Go source code for the demo, into\n\t// the root of the user's project.\n\tfilename := fmt.Sprintf(\"demo_%s.go\", demo)\n\taction := static.CopyFile(path.Join(\"/demo\", filename), filename)\n\n\topts := &static.Options{Force: force, Logger: pctx.errlog}\n\tif err := static.Do(moduleRoot, opts, action); err != nil {\n\t\treturn err\n\t}\n\tpctx.Logf(\"Run 'gocdk serve' and visit http://localhost:8080/demo/%s to see the demo.\", demo)\n\treturn nil\n}", "title": "" }, { "docid": "456b31982021b46906a066c8eeac165a", "score": "0.45856857", "text": "func newWidgets(ctx context.Context, t terminalapi.Terminal, c *container.Container) (*widgets, error) {\n\tupdateText := make(chan string)\n\tsd, err := newSegmentDisplay(ctx, t, updateText)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tinput, err := newTextInput(updateText)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\trollT, err := newRollText(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tspGreen, spRed, err := newSparkLines(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tg, err := newGauge(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\theartLC, err := newHeartbeat(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tbc, err := newBarChart(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tdon, err := newDonut(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tleftB, rightB, sineLC, err := newSines(ctx)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &widgets{\n\t\tsegDist: sd,\n\t\tinput: input,\n\t\trollT: rollT,\n\t\tspGreen: spGreen,\n\t\tspRed: spRed,\n\t\tgauge: g,\n\t\theartLC: heartLC,\n\t\tbarChart: bc,\n\t\tdonut: don,\n\t\tleftB: leftB,\n\t\trightB: rightB,\n\t\tsineLC: sineLC,\n\t}, nil\n}", "title": "" }, { "docid": "22ba4ae91443970f17136a175531401e", "score": "0.45572054", "text": "func newMandelGen(w window.Window, d gfx.Device) *mandelGen {\n\tm := &mandelGen{\n\t\tImage: make(chan image.Image),\n\t\tx: -.5,\n\t\ty: 0,\n\t\tzoom: 1,\n\t\tresolution: 8,\n\t\tmaxIter: 1000,\n\t\tbounds: d.Bounds(),\n\t}\n\n\t// Spawn the mandelbrot generation goroutine.\n\tgo m.run(w)\n\treturn m\n}", "title": "" }, { "docid": "56bac56e1c5b19c3345d2dbf8a5c8d23", "score": "0.4551347", "text": "func NewPanel(w *Window) *Panel {\n\treturn &Panel{C.new_panel(w.win)}\n}", "title": "" }, { "docid": "3c1e0af5fea600d5db30fd83828504d3", "score": "0.45405355", "text": "func (c *Credits) Construct() {\n\twidget := widgets.NewParagraph()\n\n\twidget.Title = \"💪 About Gocorona\"\n\twidget.Text = `\nWorldwide COVID-19 tracker for your terminal.\n\n©2020 Ayooluwa Isaiah and other contributors.\n\nGocorona is open source software made available under the terms of the MIT license.\n\nStar the repo or contribute on GitHub: [https://github.com/ayoisaiah/gocorona](fg:blue)\n\nGocorona relies heavily on other open source software listed below:\n\n👉 Termui: [https://github.com/gizak/termui](fg:blue)\n👉 Disease.sh API: [https://github.com/disease-sh/API](fg:blue)\n\t`\n\twidget.TextStyle = ui.NewStyle(ui.ColorClear)\n\twidget.TitleStyle = ui.NewStyle(ui.ColorClear)\n\n\tc.Widget = widget\n}", "title": "" }, { "docid": "92984b2b0878c2d6c1fbf6cbc4715d8d", "score": "0.45065665", "text": "func SecretFactory() (cli.Command, error) {\n\tcomm, err := newCommand(\"nerd secret <subcommand>\", synopsisSecret, helpSecret, nil)\n\tif err != nil {\n\t\treturn nil, errors.Wrap(err, \"failed to create command\")\n\t}\n\tcmd := &Project{\n\t\tcommand: comm,\n\t}\n\tcmd.runFunc = cmd.DoRun\n\n\treturn cmd, nil\n}", "title": "" }, { "docid": "04f81a2f0fd8df42ef391549c6a2b7b9", "score": "0.45027024", "text": "func newDiseaseMutation(c config, op Op, opts ...diseaseOption) *DiseaseMutation {\n\tm := &DiseaseMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeDisease,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "bdfba12a1aca5340f10606774dde561f", "score": "0.44977084", "text": "func NewUI() *UI {\n\tui := &UI{}\n\tui.Theme = material.NewTheme()\n\tui.Theme.Shaper = text.NewShaper(text.WithCollection(gofont.Collection()))\n\n\t// start with reasonable defaults.\n\tui.Timer = NewTimer(5 * time.Second)\n\tui.duration.Value = 5\n\n\treturn ui\n}", "title": "" }, { "docid": "60b41e416e2c7eb66163fd4b2032228b", "score": "0.44810662", "text": "func NewTeamworkPeripheral()(*TeamworkPeripheral) {\n m := &TeamworkPeripheral{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" }, { "docid": "246c44eca62b6558fb60296954c6d44a", "score": "0.44667062", "text": "func New(b bot.Bot) *DicePlugin {\n\tdp := &DicePlugin{\n\t\tBot: b,\n\t}\n\tb.RegisterRegexCmd(dp, bot.Message, rollRegex, dp.rollCmd)\n\tb.Register(dp, bot.Help, dp.help)\n\treturn dp\n}", "title": "" }, { "docid": "398c0e9a1f6030711a7332af9e99c843", "score": "0.4462591", "text": "func NewDing(webhook string, secret string) *Ding {\n\treturn &Ding{\n\t\twebhook: webhook,\n\t\tsecret: secret,\n\t\thttpclient: http.DefaultClient,\n\t}\n}", "title": "" }, { "docid": "371a846f56ecbc36954719050844dffb", "score": "0.44592023", "text": "func NewMocha(b Beverage) *Mocha {\n\treturn &Mocha{CondimentDecorator{Drink: Drink{\n\t\tdescription: \"モカ\",\n\t\tcost: 0.2},\n\t\tbeverage: b,\n\t}}\n}", "title": "" }, { "docid": "fb22f275f77eeb7d7029089f3eeb962c", "score": "0.44541892", "text": "func NewShield(opts ...Option) *Shield {\n\ts := &Shield{\n\t\troot: \"\",\n\t\tshield: \"shield\",\n\t\tsys: \"sys\",\n\t\tsysn: 1,\n\t\tlog: zap.NewNop(),\n\t}\n\tfor _, opt := range opts {\n\t\topt(s)\n\t}\n\treturn s\n}", "title": "" }, { "docid": "3c0bfc98afcfa244c469e948f71b3f8d", "score": "0.4451168", "text": "func NewMixpanel(token string, httpClient HTTPClient) *Mixpanel {\n\tif httpClient == nil {\n\t\thttpClient = &HTTPHandler{\n\t\t\tapiURL: apiURL,\n\t\t}\n\t}\n\treturn &Mixpanel{\n\t\ttoken: token,\n\t\tapiURL: apiURL,\n\t\thttpClient: httpClient,\n\t\tpeople: People{\n\t\t\ttoken: token,\n\t\t\thttpClient: httpClient,\n\t\t},\n\t}\n}", "title": "" }, { "docid": "9a013b1d1a6c916fda83c773fa9f6508", "score": "0.44411892", "text": "func NewCleaner(sess *session.Session, config Config) (*Cleaner, error) {\n\tcleaner := &Cleaner{\n\t\tec2conn: ec2.New(sess),\n\t\tautoscalingconn: autoscaling.New(sess),\n\t\tconfig: config,\n\t\tnow: time.Now().UTC(),\n\t\tused: map[string]*Used{},\n\t}\n\n\terr := cleaner.setInstanceUsed()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = cleaner.setLaunchConfigurationUsed()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = cleaner.setLaunchTemplateUsed()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn cleaner, nil\n}", "title": "" }, { "docid": "0e30be543f4e6a3a312d4c2397d64729", "score": "0.44395873", "text": "func New(t *testing.T) (OM, func()) {\n\tom := zygote.withT(t)\n\treturn om, om.cleanup\n}", "title": "" }, { "docid": "8ad68a53c39de1f0f5761b298dfbff7a", "score": "0.4436824", "text": "func (f *Window) Strut(position StrutPosition, size int) *Window {\n\t/* monitorWidth, monitorHeight := f.GetScreen().Size()\n\tscale := f.GetScreen().ScaleFactor()\n\tvar width, height int\n\n\tswitch position {\n\tcase StrutBottom, StrutTop:\n\t\twidth, height = monitorWidth, size\n\tcase StrutLeft, StrutRight:\n\t\twidth, height = size, monitorHeight\n\t}\n\tf.\n\t\tSetDecorated(false).\n\t\tResize(width, height).\n\t\tStick(true).\n\t\tSetType(TypeDock)\n\n\tC.windowStrut(C.gtk_widget_get_window(C.WindowObj(f.window)), C.winPosition(position), C.int(width), C.int(height), C.int(monitorWidth), C.int(monitorHeight), C.int(scale))\n\tC.gtk_window_set_gravity(C.WindowObj(f.window), C.GDK_GRAVITY_NORTH_WEST)\n\n\tswitch position {\n\tcase StrutTop, StrutLeft:\n\t\tf.Move(0, 0)\n\tcase StrutBottom:\n\t\tf.Move(0, monitorHeight-height)\n\tcase StrutRight:\n\t\tf.Move(monitorWidth-width, 0)\n\t}\n\tf.Stick(true).SetType(TypeDock) */\n\treturn f\n}", "title": "" }, { "docid": "5aafcac9aae08d4d159a72b5ec929e00", "score": "0.4436781", "text": "func newMealMutation(c config, op Op, opts ...mealOption) *MealMutation {\n\tm := &MealMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeMeal,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "bbbf7b3818b3581fe6d6a2c3e0fe61c9", "score": "0.4426647", "text": "func newDispenseMutation(c config, op Op, opts ...dispenseOption) *DispenseMutation {\n\tm := &DispenseMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeDispense,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "a44945d3e58f6913e751a141d02cfe9c", "score": "0.4423424", "text": "func (d *Dummy) DUT() error {\n\tlog.Println(d.ctx, \"DUT\")\n\treturn nil\n}", "title": "" }, { "docid": "cd4dfceda2c36e935991388514f4f66c", "score": "0.4419812", "text": "func NewGuildsWidget() *tview.TreeView {\n\tw := tview.NewTreeView()\n\tw.\n\t\tSetTopLevel(1).\n\t\tSetRoot(tview.NewTreeNode(\"\")).\n\t\tSetBorder(true).\n\t\tSetBorderPadding(0, 0, 1, 0).\n\t\tSetTitle(\"Guilds\").\n\t\tSetTitleAlign(tview.AlignLeft)\n\n\treturn w\n}", "title": "" }, { "docid": "518f9806dd879149bf0240614303e665", "score": "0.44086707", "text": "func NewTheyDo(toDo func(string)) TheyDo {\n\treturn TheyDo{\n\t\twhat: \"something\",\n\t\tToDo: toDo,\n\t}\n}", "title": "" }, { "docid": "e582bd29146ae8bac8a5fa1b0c74ba3e", "score": "0.4405227", "text": "func newSimulator(params *chaincfg.Params, verbose bool) *simulator {\n\treturn &simulator{\n\t\tparams: params,\n\t\tverbose: verbose,\n\t\tliveTickets: tickettreap.NewImmutable(),\n\t\texpireHeights: make(map[int32][]*stakeTicket),\n\t\tmaturingSupply: make(map[int32]dcrutil.Amount),\n\t}\n}", "title": "" }, { "docid": "4849a1378d3b89ab23b064c6401cf114", "score": "0.4402944", "text": "func TestNewUTS(t *testing.T) {\n\tSkipConvey(\"TestNewUTS\", t, func() {\n\t\tSo(func() { NewUTS() }, ShouldNotPanic)\n\t})\n}", "title": "" }, { "docid": "dc519e1dd358be0e038d4ff431ee0daf", "score": "0.43891883", "text": "func newBnsd(t testing.TB) (abci.Application, func()) {\n\tt.Helper()\n\n\thomeDir, err := ioutil.TempDir(\"\", \"bnsd_performance_home\")\n\tif err != nil {\n\t\tt.Fatalf(\"cannot create a temporary directory: %s\", err)\n\t}\n\topts := &server.Options{\n\t\tMinFee: coin.Coin{},\n\t\tHome: homeDir,\n\t\tLogger: log.NewNopLogger(),\n\t\tDebug: false,\n\t}\n\tbnsd, err := GenerateApp(opts)\n\tif err != nil {\n\t\tt.Fatalf(\"cannot generate bnsd instance: %s\", err)\n\t}\n\n\tcleanup := func() {\n\t\tos.RemoveAll(homeDir)\n\t}\n\treturn bnsd, cleanup\n}", "title": "" }, { "docid": "03de9bbb67af01c3dd11cfd92c432f53", "score": "0.43793306", "text": "func NewGadget(config *GadgetConfig) (Gadgeter, error) {\n\tif config.Type == \"cron\" {\n\t\treturn newSystemGadget(config)\n\t}\n\tswitch deviceType(config.Pin.Type) {\n\tcase \"input\":\n\t\treturn NewInputGadget(config)\n\tcase \"output\":\n\t\treturn NewOutputGadget(config)\n\t}\n\treturn nil, fmt.Errorf(\n\t\t\"couldn't build a gadget based on config: %s %s\",\n\t\tconfig.Location,\n\t\tconfig.Name,\n\t)\n}", "title": "" }, { "docid": "dcf3c5ef95f4ca7ad650c9487623511e", "score": "0.43712553", "text": "func New() *Dirtree {\n\treturn &Dirtree{}\n}", "title": "" }, { "docid": "3fd13f340f533f784a854ca4c1b38523", "score": "0.43600953", "text": "func NewDuty(slot phase0.Slot, contributionIndices map[phase0.ValidatorIndex][]phase0.CommitteeIndex) *Duty {\n\tvalidatorIndices := make([]phase0.ValidatorIndex, 0, len(contributionIndices))\n\tfor k := range contributionIndices {\n\t\tvalidatorIndices = append(validatorIndices, k)\n\t}\n\n\treturn &Duty{\n\t\tslot: slot,\n\t\tvalidatorIndices: validatorIndices,\n\t\tcontributionIndices: contributionIndices,\n\t\taccounts: make(map[phase0.ValidatorIndex]e2wtypes.Account, len(contributionIndices)),\n\t\taggregatorSubcommittees: make(map[phase0.ValidatorIndex]map[uint64]phase0.BLSSignature),\n\t}\n}", "title": "" }, { "docid": "78e8ad7155b769ac29afa44d3a293145", "score": "0.4360033", "text": "func newDockerPuller(client libdocker.Interface) DockerPuller {\n\treturn &dockerPuller{\n\t\tclient: client,\n\t\tkeyring: credentialprovider.NewDockerKeyring(),\n\t}\n}", "title": "" }, { "docid": "9eb83aa8a939594a686e718b576c2eea", "score": "0.43598482", "text": "func NewPairingUI() (ConsolePairingUI, error) {\n\n\tif factoryReset {\n\t\treturn newDirectPairingUI()\n\t} else {\n\n\t\tconn, err := ninja.Connect(\"sphere-setup-assistant\")\n\n\t\tif err != nil {\n\t\t\tlog.Fatalf(\"Failed to connect to mqtt: %s\", err)\n\t\t}\n\n\t\treturn &ledControllerPairingUI{\n\t\t\tconn: conn,\n\t\t\tserial: config.Serial(),\n\t\t}, nil\n\t}\n}", "title": "" }, { "docid": "661381d931fdbce8af9c7820542462f0", "score": "0.43586242", "text": "func NewSecret(client *KubeClient, ns, name string, data map[string][]byte) *Secret {\n\treturn &Secret{\n\t\tname: name,\n\t\tnamespace: ns,\n\t\tkubeClient: client,\n\t\tdata: data,\n\t}\n}", "title": "" }, { "docid": "43080e63a8ec49598cf4f8cc177132f8", "score": "0.4349272", "text": "func NewMixpanel(token string) *Mixpanel {\n\treturn &Mixpanel{\n\t\tToken: token,\n\t\tBaseUrl: apiBaseURL,\n\t}\n}", "title": "" }, { "docid": "ecc8e489b2f3bf29b18c17bb5992450f", "score": "0.43487704", "text": "func (server) CreateDonuts(ctx context.Context, req *donutspb.CreateDonutsRequest) (*donutspb.CreateDonutsResponse, error) {\n\n\t// Read request data\n\tdonut := req.GetDonut()\n\tcount := req.GetCount()\n\n\t// Create data object to be inserted into DB\n\tdata := donutItem{\n\t\tName: donut.GetName(),\n\t\tPrice: donut.GetPrice(),\n\t\tRating: donut.GetRating(),\n\t\tCount: count,\n\t}\n\n\tinsertResponse, insertError := collection.InsertOne(context.Background(), data)\n\n\t// Handle insertion error\n\tif insertError != nil {\n\t\tfmt.Printf(\"\\n Error inserting donuts %v \\n\", insertError)\n\t\treturn nil, status.Errorf(codes.Internal, \"Error creating new donut record\")\n\t}\n\n\toid, ok := insertResponse.InsertedID.(primitive.ObjectID)\n\n\t// Handle error while reading the ID\n\tif !ok {\n\t\treturn nil, status.Errorf(codes.Internal, \"Error converting to OID\")\n\t}\n\n\tfmt.Printf(\"\\nCreated new donut record %v\", oid)\n\n\t//TODO: fill in the response\n\treturn &donutspb.CreateDonutsResponse{\n\t\tCreated: true,\n\t}, nil\n}", "title": "" }, { "docid": "4a183c1c823b47108700b2b8fada4bdf", "score": "0.43474084", "text": "func NewWWW(config configuration_pkg.CONFIGURATION) *WWW_IMPL {\r\n client := new(WWW_IMPL)\r\n client.config = config\r\n return client\r\n}", "title": "" }, { "docid": "7999a2a61d9de53320b7d73f70f24440", "score": "0.43414992", "text": "func NewWatch(t mockConstructorTestingTNewWatch) *Watch {\n\tmock := &Watch{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "2c01f2bf71e3aee4b9f5b4253efb104c", "score": "0.4340872", "text": "func (c *Client) NewMeasurement() (req *MeasurementRequest) {\n\tvar defs []Definition\n\n\tps := NewProbeSet(c.config.PoolSize, c.config.AreaType, c.config.AreaValue, c.config.Tags)\n\treq = &MeasurementRequest{\n\t\tDefinitions: defs,\n\t\tIsOneoff: true,\n\t\tProbes: []ProbeSet{ps},\n\t}\n\tc.verbose(\"probes: %#v\", req.Probes)\n\treturn\n}", "title": "" }, { "docid": "f6d5b1314873df586665d8beb2aa772c", "score": "0.43338856", "text": "func newTestDialer(t *testing.T, conns ...net.Conn) mqtt.Dialer {\n\tt.Helper()\n\n\tvar dialN atomic.Uint64\n\n\tt.Cleanup(func() {\n\t\tn := dialN.Load()\n\t\tif n < uint64(len(conns)) && !t.Failed() {\n\t\t\tt.Errorf(\"got %d Dialer invocations, want %d\", n, len(conns))\n\t\t}\n\t})\n\n\treturn func(context.Context) (net.Conn, error) {\n\t\tn := dialN.Add(1)\n\t\tt.Log(\"Dial #\", n)\n\t\tif n > uint64(len(conns)) {\n\t\t\treturn nil, errLastTestConn\n\t\t}\n\t\treturn conns[n-1], nil\n\t}\n}", "title": "" }, { "docid": "898d043047f330bed9d991e774abeb89", "score": "0.4332871", "text": "func New(cfg *Config, callback func(*MeasurementResult)) *Client {\n\tc := &Client{\n\t\tinChan: make(chan *inPacket, 10),\n\t\tm: newMeasurements(),\n\t\tcfg: cfg,\n\t\tcallback: callback,\n\t}\n\treturn c\n}", "title": "" }, { "docid": "0c49cdc49369cb40f870e741c5802433", "score": "0.43307227", "text": "func newMealplanMutation(c config, op Op, opts ...mealplanOption) *MealplanMutation {\n\tm := &MealplanMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeMealplan,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "3089015a16557f63e9e17be6e33caa96", "score": "0.43302357", "text": "func NewDummy(opts map[string]interface{}) (*Dummy, error) { return &Dummy{}, nil }", "title": "" }, { "docid": "d5bad189b00a817c4767774938b04a36", "score": "0.4329156", "text": "func NewWDG(opts ...graph.Option) (*WDG, error) {\n\tgopts := graph.Options{}\n\tfor _, apply := range opts {\n\t\tapply(&gopts)\n\t}\n\n\twg, err := NewWG(simple.NewWeightedDirectedGraph(gopts.Weight, gopts.Weight), opts...)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn &WDG{\n\t\tWG: wg,\n\t}, nil\n}", "title": "" }, { "docid": "7f2e67ce919e45ce195cad31940386f8", "score": "0.43280777", "text": "func TestNew(t *testing.T) {\n\t// 创建托盘\n\ttray, err := New(&Options{\n\t\t// 提示信息\n\t\tTip: \"test\",\n\t\t// 托盘logo\n\t\tIcon: \"./logo.ico\",\n\t\t// 托盘点击事件\n\t\tClick: func(x, y int) {\n\t\t\tfmt.Println(\"x:\", x, \"y:\", y)\n\t\t},\n\t\t// 托盘右键菜单\n\t\tMenus: Menus{\n\t\t\t{\n\t\t\t\tName: \"test\",\n\t\t\t\tAction: func(tray *Tray) {\n\t\t\t\t\tfmt.Println(\"click test\")\n\t\t\t\t},\n\t\t\t},\n\t\t\t{\n\t\t\t\tName: \"exit\",\n\t\t\t\tAction: func(tray *Tray) {\n\t\t\t\t\t_ = tray.Stop()\n\t\t\t\t},\n\t\t\t},\n\t\t},\n\t})\n\tif err != nil {\n\t\tt.Fatal(err)\n\t}\n\n\t// 托盘信息\n\ttray.Message(\"running\", \"is running\")\n\n\t// 启动托盘\n\ttray.Run()\n}", "title": "" }, { "docid": "746e1296125f15dc35f9cf8cb1aba620", "score": "0.43236372", "text": "func newDigitalPinGpiod(chipName string, pin int, options ...func(gobot.DigitalPinOptioner) bool) *digitalPinGpiod {\n\tif chipName == \"\" {\n\t\tchipName = \"gpiochip0\"\n\t}\n\tcfg := newDigitalPinConfig(\"gobotio\"+strconv.Itoa(int(pin)), options...)\n\td := &digitalPinGpiod{\n\t\tchipName: chipName,\n\t\tpin: pin,\n\t\tdigitalPinConfig: cfg,\n\t}\n\treturn d\n}", "title": "" }, { "docid": "3686d69bab310ee5fdb6bdf0659ccb67", "score": "0.43196216", "text": "func new() *server {\n\tc, err := chromedp.New(context.Background(), chromedp.WithLog(func(string, ...interface{}) {}))\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\treturn &server{CDP: c}\n}", "title": "" }, { "docid": "290641d979a2be26d582f89f03a6b35c", "score": "0.43194404", "text": "func (g *Galleries) New(w http.ResponseWriter, r *http.Request) {\n\tg.NewView.Render(w, r, nil)\n}", "title": "" }, { "docid": "dafcc568d060e9bfe132dd72e22066a7", "score": "0.43183118", "text": "func (p *pkgClient) newSecret(name, namespace string, secretType corev1.SecretType) *corev1.Secret {\n\treturn &corev1.Secret{\n\t\tTypeMeta: metav1.TypeMeta{Kind: tkgpackagedatamodel.KindSecret, APIVersion: corev1.SchemeGroupVersion.String()},\n\t\tObjectMeta: metav1.ObjectMeta{Name: name, Namespace: namespace},\n\t\tType: secretType,\n\t\tData: map[string][]byte{},\n\t}\n}", "title": "" }, { "docid": "aacafef86ec994b1feb517f9f2175846", "score": "0.43084124", "text": "func newFoodMutation(c config, op Op, opts ...foodOption) *FoodMutation {\n\tm := &FoodMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeFood,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "832594da1116e8302a5d3b04ddac2559", "score": "0.43080735", "text": "func newDoctorMutation(c config, op Op, opts ...doctorOption) *DoctorMutation {\n\tm := &DoctorMutation{\n\t\tconfig: c,\n\t\top: op,\n\t\ttyp: TypeDoctor,\n\t\tclearedFields: make(map[string]struct{}),\n\t}\n\tfor _, opt := range opts {\n\t\topt(m)\n\t}\n\treturn m\n}", "title": "" }, { "docid": "5aa165c7ff7160d78c5d18b6288e7423", "score": "0.43066353", "text": "func NewDealer(r *rand.Rand) Dealer {\n\treturn dealer{r: r}\n}", "title": "" }, { "docid": "b545f9ec06d2a750cb81c38b5a374907", "score": "0.43024907", "text": "func NewWidget(name string, serialNumber uint64) (*Widget, error) {\n\twidget := &Widget{}\n\twidget.age = 0\n\tif widget == nil {\n\t\treturn nil, errors.New(\"failed to create an instance of Widget\")\n\t}\n\n\terr := widget.SetName(name)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = widget.SetSerialNumber(serialNumber)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\terr = widget.SetCreatedUtc(time.Now().UTC())\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn widget, nil\n}", "title": "" }, { "docid": "5f0b9e7105ed4eb401aee5bc744d795c", "score": "0.43023443", "text": "func Run(p Platform, r Renderer) {\n\timgui.CurrentIO().SetClipboard(clipboard{platform: p})\n\n\t// Initialize local state\n\tshowDemoWindow := false\n\tclearColor := [3]float32{0.0, 0.0, 0.0}\n\tconnectionStatus := \"Online\"\n\n\t// Initialize TickerPlant\n\turl := url.URL{Scheme: \"ws\", Host: \"localhost:8080\", Path: \"/ws\"}\n\ttickerPlant, err := NewTickerPlant(url)\n\tif err != nil {\n\t\tlog.Fatalln(err)\n\t\treturn\n\t}\n\tgo func() {\n\t\ttickerPlant.Run()\n\t\tdefer func() {\n\t\t\ttickerPlant.Close()\n\t\t\tconnectionStatus = \"Offline\"\n\t\t}()\n\t}()\n\n\t// Run the window\n\tfor !p.ShouldStop() {\n\t\tp.ProcessEvents()\n\n\t\t// Signal start of a new frame\n\t\tp.NewFrame()\n\t\timgui.NewFrame()\n\n\t\t// Show a simple window.\n\t\t{\n\t\t\timgui.Begin(\"Welcome\")\n\t\t\timgui.Text(\"Hello!\") // Display some text\n\t\t\timgui.ColorEdit3(\"clear color\", &clearColor) // Edit 3 floats representing a color\n\n\t\t\timgui.Checkbox(\"Demo Window\", &showDemoWindow) // Edit bools storing our window open/close state\n\n\t\t\tif imgui.Button(\"Subscribe trades\") {\n\t\t\t\ttickerPlant.SubscribeOrderBook(\"ESU0\", \"CME\")\n\t\t\t}\n\n\t\t\timgui.Text(fmt.Sprintf(\"Application average %.3f ms/frame (%.1f FPS)\",\n\t\t\t\tmillisPerSecond/imgui.CurrentIO().Framerate(), imgui.CurrentIO().Framerate()))\n\t\t\timgui.Text(fmt.Sprintf(\"Connection Status:\"))\n\t\t\timgui.SameLine()\n\t\t\timgui.Text(fmt.Sprint(connectionStatus))\n\n\t\t\timgui.End()\n\t\t}\n\n\t\t// Show the ImGui demo window. Most of the sample code is in imgui.ShowDemoWindow().\n\t\tif showDemoWindow {\n\t\t\t// Normally user code doesn't need/want to call this because positions are saved in .ini file anyway.\n\t\t\t// Here we just want to make the demo initial state a bit more friendly!\n\t\t\tconst demoX = 650\n\t\t\tconst demoY = 20\n\t\t\timgui.SetNextWindowPosV(imgui.Vec2{X: demoX, Y: demoY}, imgui.ConditionFirstUseEver, imgui.Vec2{})\n\n\t\t\timgui.ShowDemoWindow(&showDemoWindow)\n\t\t}\n\n\t\t// Rendering\n\t\timgui.Render() // This call only creates the draw data list. Actualy rendering to framebuffer is done below.\n\n\t\tr.PreRender(clearColor)\n\t\tr.Render(p.DisplaySize(), p.FramebufferSize(), imgui.RenderedDrawData())\n\t\tp.PostRender()\n\n\t\t// sleep to avoid 100% CPU usage\n\t\t//<-time.After(sleepDuration)\n\t}\n}", "title": "" }, { "docid": "d0b2b693dacb7f9cc373ae7bb8aa4b49", "score": "0.42950657", "text": "func NewDrop(ctx *plan.Context, p *plan.Drop) *Drop {\n\tm := &Drop{\n\t\tTaskBase: NewTaskBase(ctx),\n\t\tp: p,\n\t}\n\treturn m\n}", "title": "" }, { "docid": "ecc29223305084b1e6e04ac265f4195a", "score": "0.42911285", "text": "func new(id string) (*scraper, error) {\n\n\treturn &scraper{\n\t\tid: id,\n\t\tparentLinks: make(map[string]string),\n\t\tuseProxy: true,\n\t}, nil\n}", "title": "" }, { "docid": "9c219efa22857346f6d5751282c528b9", "score": "0.4283219", "text": "func NewGauge(namespace, subsystem, name, help string) prometheus.Gauge {\n\treturn promauto.NewGauge(\n\t\tprometheus.GaugeOpts{\n\t\t\tNamespace: namespace,\n\t\t\tSubsystem: subsystem,\n\t\t\tName: name,\n\t\t\tHelp: help,\n\t\t},\n\t)\n}", "title": "" }, { "docid": "8aea7c383ea11517fa9c5e97b5f7a394", "score": "0.42806578", "text": "func New(n Notifier, feeds []Feed, interval time.Duration) *Bot {\n\treturn &Bot{notifier: n, feeds: feeds, interval: interval}\n}", "title": "" }, { "docid": "ce709ffb96ecbd0ce9c8b2a764d3d010", "score": "0.42800504", "text": "func New() Duo {\n\tduoHTTPClient := &http.Client{\n\t\tTimeout: time.Second * consts.HttpTimeoutInSeconds,\n\t}\n\treturn Duo{httpClient: duoHTTPClient}\n}", "title": "" }, { "docid": "76b5b248a355b41164f4f573daffd700", "score": "0.42789325", "text": "func NewJingDong(option JDConfig, itemType string) *JingDong {\n\tjd := &JingDong{\n\t\tJDConfig: option,\n\t\titemType: itemType,\n\t\tSkuIds: make(chan *models.SKUInfo, 1000),\n\t}\n\n\tjd.jar = NewSimpleJar(JarOption{\n\t\tJarType: JarJson,\n\t\tFilename: cookieFile,\n\t})\n\n\tif err := jd.jar.Load(); err != nil {\n\t\tclog.Error(0, \"加载Cookies失败: %s\", err)\n\t\tjd.jar.Clean()\n\t}\n\n\tjd.downloader = &Downloader{\n\t\t&http.Client{\n\t\t\tTimeout: time.Second * 5,\n\t\t\tJar: jd.jar,\n\t\t},\n\t}\n\n\treturn jd\n}", "title": "" }, { "docid": "1fd312f258e0fc58ce89fc301567e0fa", "score": "0.4278802", "text": "func newGauge(gv *prometheus.GaugeVec) *gauge {\n\treturn &gauge{\n\t\tgv: gv,\n\t}\n}", "title": "" }, { "docid": "81a9cecc6b5b46fde8a6f8a6d410b6cd", "score": "0.427827", "text": "func create() {\n\tvar err error\n\tDiscord, err = discordgo.New(\"Bot \" + os.Getenv(\"DISCORD_TOKEN\"))\n\tif err != nil {\n\t\tlog.Fatalf(\"Invalid bot parameters: %v\", err)\n\t}\n\tlog.Println(\"Great success!\")\n}", "title": "" }, { "docid": "f56beccfbfc9f5f76f84c6443df226cb", "score": "0.4272405", "text": "func NewDummyProvider(d time.Duration) DummyProvider {\n\treturn DummyProvider{\n\t\tl: log.New(os.Stdout, \"DummyProvider\", log.LstdFlags),\n\t\ts: make(chan struct{}),\n\t\td: d,\n\t}\n}", "title": "" }, { "docid": "935f217148d8822bc0e81339fed81abf", "score": "0.42714277", "text": "func NewDryRun(cycle string, table bool) DryRun {\n\tconfig, err := config.New()\n\tif err != nil {\n\t\tlog.WithField(\"error\", err.Error()).Fatal(\"Failed to load config.\")\n\t}\n\n\t// Clear sensitive data if loaded\n\tconfig.Key.Password = \"\"\n\tconfig.Key.Esk = \"\"\n\n\tc, err := strconv.Atoi(cycle)\n\tif err != nil {\n\t\tlog.WithField(\"error\", err.Error()).Fatal(\"Failed to parse cycle argument into integer.\")\n\t}\n\n\tpayout, err := payout.New(config, c, false, false)\n\tif err != nil {\n\t\tlog.WithField(\"error\", err.Error()).Fatal(\"Failed to intialize payout.\")\n\t}\n\n\treturn DryRun{\n\t\tpayout: payout,\n\t\tconfig: config,\n\t\tcycle: c,\n\t\ttable: table,\n\t}\n}", "title": "" }, { "docid": "800f96d9866134a23c28c5d31de62e49", "score": "0.4268602", "text": "func New(client *github.Client) *WatchDog {\n\treturn &WatchDog{\n\t\tClient: client,\n\t}\n}", "title": "" }, { "docid": "0f3a0c7344f5afdd1d39e8935f674300", "score": "0.42676324", "text": "func new() *runner {\n\treturn &runner{\n\t\tcloseTimeout: defaultCloseTimeout,\n\t\tproduceCounts: make(map[reflect.Type]int),\n\t\tprovideSlice: make(map[reflect.Type]bool),\n\t\tvalues: make(map[reflect.Type]reflect.Value),\n\t}\n}", "title": "" }, { "docid": "f3f6e02abaa1c42766f970bbbf2c62e6", "score": "0.42634898", "text": "func NewSecretStore(t mockConstructorTestingTNewSecretStore) *SecretStore {\n\tmock := &SecretStore{}\n\tmock.Mock.Test(t)\n\n\tt.Cleanup(func() { mock.AssertExpectations(t) })\n\n\treturn mock\n}", "title": "" }, { "docid": "bfb2f1f149dbbc3933e3cdb4f8c02258", "score": "0.42599887", "text": "func NewDry(screen *ui.Screen, env *drydocker.Env) (*Dry, error) {\n\td, err := drydocker.ConnectToDaemon(env)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn newDry(screen, d)\n}", "title": "" }, { "docid": "5ab589644fa01c516c3142196b27fe66", "score": "0.42597172", "text": "func newUnsyncedDemos(checkoutDir, demoPath string) *syncedDemos {\n\treturn &syncedDemos{\n\t\tdemoPath: filepath.Join(checkoutDir, demoPath),\n\t}\n}", "title": "" }, { "docid": "97b7f9c01dc5076b8eefb9a1d7ea8365", "score": "0.42574966", "text": "func newDiscovery(d ...interface{}) *Discovery {\n\treturn &Discovery{time: time.Now(), data: d}\n}", "title": "" }, { "docid": "5b27e3b077603a84d32550d54ed69e45", "score": "0.42505988", "text": "func New(ctx context.Context) (*Debugd, error) {\n\t_, obj, err := dbusutil.Connect(ctx, dbusName, dbusPath)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn &Debugd{obj}, nil\n}", "title": "" }, { "docid": "97bfdc52d93455c699e52e2440f8f1b4", "score": "0.42372963", "text": "func NewWeglotDiscover(config Config) *WeglotDiscover {\n\n\tmutex := &sync.Mutex{}\n\tfoundUrls := make(map[string]bool)\n\turlsWithCount := []urlWithCount{}\n\n\tcrawler := colly.NewCollector(\n\t\tcolly.MaxDepth(config.Depth),\n\t\tcolly.Async(true),\n\t\tcolly.AllowedDomains(config.Domain...),\n\t)\n\tcrawler.AllowURLRevisit = false\n\tcrawler.Limit(&colly.LimitRule{DomainGlob: \"*\", Parallelism: 2})\n\n\tweglotDiscover := WeglotDiscover{config, crawler, mutex, 0, foundUrls, urlsWithCount}\n\tweglotDiscover.setCallbacks()\n\n\treturn &weglotDiscover\n}", "title": "" }, { "docid": "d8e248160848d7e0ae4eeaef43afa8d1", "score": "0.423137", "text": "func New(config Config) (*Tugboat, error) {\n\tdb, err := dialDB(config.DB)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tstore := &store{db: db}\n\n\tpusher, err := newPusherClient(config.Pusher.URL)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tgithub := newGitHubClient(config.GitHub.Token)\n\n\tvar updater multiUpdater\n\n\tif config.Pusher.URL != \"\" {\n\t\tupdater = append(updater, &pusherUpdater{\n\t\t\tpusher: pusher,\n\t\t})\n\t}\n\n\tif config.GitHub.Token != \"\" {\n\t\tupdater = append(updater, &githubUpdater{\n\t\t\tgithub: github.Repositories,\n\t\t})\n\t}\n\n\tdeployments := newDeploymentsService(store, updater)\n\tlogs := newLogsService(store, pusher)\n\ttokens := newTokensService(config.ProviderSecret)\n\n\treturn &Tugboat{\n\t\tstore: store,\n\t\tdeployments: deployments,\n\t\tlogs: logs,\n\t\ttokens: tokens,\n\t}, nil\n}", "title": "" }, { "docid": "33a8b3e8294b591f2d379a4ce8cd7f2d", "score": "0.4228399", "text": "func NewDashing() *Dashing {\n\tbroker := NewBroker()\n\tworker := NewWorker(broker)\n\tserver := NewServer(broker)\n\n\tif os.Getenv(\"WEBROOT\") != \"\" {\n\t\tserver.webroot = filepath.Clean(os.Getenv(\"WEBROOT\")) + \"/\"\n\t}\n\tif os.Getenv(\"DEV\") != \"\" {\n\t\tserver.dev = true\n\t}\n\n\treturn &Dashing{\n\t\tstarted: false,\n\t\tBroker: broker,\n\t\tWorker: worker,\n\t\tServer: server,\n\t}\n}", "title": "" }, { "docid": "a560fd84446ccee0fa8007bc7d1ff9bc", "score": "0.42210665", "text": "func NewDialer(t time.Duration, proxy string, connect string) Dialer {\n\tif len(proxy) > 0 {\n\t\treturn NewProxyDialer(5*time.Second, proxy, connect)\n\t}\n\treturn NewDirectDialer(5*time.Second, connect)\n}", "title": "" }, { "docid": "b86fad3fffb50a8018de54f232e0959e", "score": "0.42162016", "text": "func newDataset(d diviner.Dataset) *dataset {\n\treturn &dataset{\n\t\tDataset: d,\n\t\tdonec: make(chan struct{}),\n\t}\n}", "title": "" }, { "docid": "0796b222ce73b2d5572a97bad5906eae", "score": "0.421122", "text": "func (stm *STM) DUT() error {\n\treturn stm.executeCommand(\"dut\")\n}", "title": "" }, { "docid": "1b9a92ceba4725a5cdd29e3ecd14e376", "score": "0.4208875", "text": "func NewShootCreationFramework(cfg *ShootCreationConfig) *ShootCreationFramework {\n\tvar gardenerConfig *GardenerConfig\n\tif cfg != nil {\n\t\tgardenerConfig = cfg.GardenerConfig\n\t}\n\n\tf := &ShootCreationFramework{\n\t\tGardenerFramework: NewGardenerFramework(gardenerConfig),\n\t\tTestDescription: NewTestDescription(\"SHOOTCREATION\"),\n\t\tConfig: cfg,\n\t}\n\n\tginkgo.BeforeEach(func() {\n\t\tf.GardenerFramework.BeforeEach()\n\t\tf.BeforeEach()\n\t})\n\tCAfterEach(f.AfterEach, 10*time.Minute)\n\treturn f\n}", "title": "" }, { "docid": "af67315688fac2fc18040b6a5e59c59d", "score": "0.4207876", "text": "func New(d time.Duration) *Runner {\n\treturn &Runner{\n\t\t//Es un buffered channel de tamaño 1. Esto hace que quien publique una interrupción, no tenga que esperar a que se consuma, a no ser que ya hubiera una interrupción pendiente de procesar\n\t\tinterrupt: make(chan os.Signal, 1),\n\t\tcomplete: make(chan error),\n\t\ttimeout: time.After(d),\n\t}\n}", "title": "" }, { "docid": "03b2965dce37ac374e57b25faee84704", "score": "0.4205357", "text": "func New(name string) *UDE {\n\treturn &UDE{\n\t\tName: name,\n\t}\n}", "title": "" }, { "docid": "b808d261da50e05f1e348eb81a3f22c4", "score": "0.42027512", "text": "func (c *Client) NewGauge(name, unit string, opts ...MetricOption) *Gauge {\n\topts = append(opts, WithTags(c.tags))\n\tm := NewGauge(name, unit, c.sourceID, opts...)\n\tgo c.pulse(m)\n\n\treturn m\n}", "title": "" }, { "docid": "15d2df38b59b3ab8e6cc3d55d2037687", "score": "0.42019734", "text": "func NewTuber() Tuber {\n\treturn &tube{\n\t\tpayloads: make(map[EventName]reflect.Type),\n\t\tregistars: make(map[string]*registar),\n\t}\n}", "title": "" }, { "docid": "f88d354f4d581d970e3b4566dc2901bf", "score": "0.42009607", "text": "func NewSimulationAutomation()(*SimulationAutomation) {\n m := &SimulationAutomation{\n Entity: *NewEntity(),\n }\n return m\n}", "title": "" } ]
ca96d5ac13cec44c6636e07d2a3c02ea
UnmountPath is a common unmount routine that unmounts the given path and deletes the remaining directory if successful.
[ { "docid": "8701e644599b66ad303ce6b130413695", "score": "0.80375", "text": "func UnmountPath(mountPath string, mounter Interface) error {\n\tpathExists, pathErr := PathExists(mountPath)\n\tif !pathExists {\n\t\treturn nil\n\t}\n\tcorruptedMnt := IsCorruptedMnt(pathErr)\n\tif pathErr != nil && !corruptedMnt {\n\t\treturn fmt.Errorf(\"Error checking path: %v\", pathErr)\n\t}\n\tif !corruptedMnt {\n\t\tvar notMnt bool\n\t\tvar err error\n\t\tnotMnt, err = IsNotMountPoint(mounter, mountPath)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\n\t\tif notMnt {\n\t\t\treturn os.Remove(mountPath)\n\t\t}\n\t}\n\n\t// Unmount the mount path\n\tif err := mounter.Unmount(mountPath); err != nil {\n\t\treturn err\n\t}\n\tnotMnt, mntErr := mounter.IsLikelyNotMountPoint(mountPath)\n\tif mntErr != nil {\n\t\treturn mntErr\n\t}\n\tif notMnt {\n\t\treturn os.Remove(mountPath)\n\t}\n\treturn fmt.Errorf(\"Failed to unmount path %v\", mountPath)\n}", "title": "" } ]
[ { "docid": "f911201c3b600b4a73831b737ce7b851", "score": "0.7302605", "text": "func (f FSUtil) UnMount(path string) error {\n\t// If the path isn't a directory, we're not mounted there.\n\t_, err := exec.Command(\"test\", \"-d\", path).CombinedOutput()\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\t// If the path isn't mounted, then we're not mounted.\n\t_, err = exec.Command(\"findmnt\", \"-f\", path).CombinedOutput()\n\tif err != nil {\n\t\treturn nil\n\t}\n\n\tout, err := exec.Command(\"umount\", path).CombinedOutput()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unable to unmount device: %q: %s\", err, out)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "40c65ab7aa8e070c9866df8b84fe24c7", "score": "0.68242157", "text": "func (e *ext) unmount(path string) error {\n\tlog.Debugf(msgUnmount, path)\n\te.history = append(e.history, fmt.Sprintf(msgUnmount, path))\n\n\t// ignore NOENT errors, treat as success\n\tif err := syscall.Unmount(\n\t\tpath, syscall.MNT_DETACH); err != nil && !os.IsNotExist(err) {\n\n\t\t// when mntpoint exists but is unmounted, get EINVAL\n\t\te, ok := err.(syscall.Errno)\n\t\tif ok && e == syscall.EINVAL {\n\t\t\treturn nil\n\t\t}\n\n\t\treturn errPermsAnnotate(os.NewSyscallError(\"umount\", err))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "079c5a925954accbd035be2134858ad9", "score": "0.6441021", "text": "func Unmount(path string) error {\n\t// Mount pont must be directory\n\tif out, err := exec.Command(\"test\", \"-d\", path).CombinedOutput(); err != nil {\n\t\tlog.Println(\"test -d\", path, string(out))\n\t\treturn err\n\t}\n\n\t// Mount point isn't mounted\n\tif out, err := exec.Command(\"findmnt\", \"-f\", path).CombinedOutput(); err != nil {\n\t\tlog.Println(\"findmnt -f\", path, string(out))\n\t}\n\n\tif out, err := exec.Command(\"umount\", path).CombinedOutput(); err != nil {\n\t\tlog.Println(\"umount\", path, string(out))\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "52cab049588c69aabc978835a07f15ac", "score": "0.6362131", "text": "func (c Context) Unmount() error {\n\tif info, err := utils.MountInfo(); err == nil { // darwin only\n\t\tif image := info.Mount(c.MountPoint); image != nil {\n\t\t\tc.DmgPath = filepath.Clean(image.ImagePath)\n\t\t}\n\t}\n\tif err := utils.Retry(3, 2*time.Second, func() error {\n\t\treturn utils.Unmount(c.MountPoint, false)\n\t}); err != nil {\n\t\treturn fmt.Errorf(\"failed to unmount %s at %s: %v\", c.DmgPath, c.MountPoint, err)\n\t}\n\t// TODO: check if DmgPath is safe before removing (should be in /tmp and should be src of mount)\n\treturn os.Remove(filepath.Clean(c.DmgPath))\n}", "title": "" }, { "docid": "09e3dc561802a4fc728d276e389fc272", "score": "0.62427473", "text": "func (d *flexVolumeDetacher) UnmountDevice(deviceMountPath string) error {\n\n\tpathExists, pathErr := mount.PathExists(deviceMountPath)\n\tif !pathExists {\n\t\tklog.Warningf(\"Warning: Unmount skipped because path does not exist: %v\", deviceMountPath)\n\t\treturn nil\n\t}\n\tif pathErr != nil && !mount.IsCorruptedMnt(pathErr) {\n\t\treturn fmt.Errorf(\"error checking path: %w\", pathErr)\n\t}\n\n\tnotmnt, err := isNotMounted(d.plugin.host.GetMounter(d.plugin.GetPluginName()), deviceMountPath)\n\tif err != nil {\n\t\tif mount.IsCorruptedMnt(err) {\n\t\t\tnotmnt = false // Corrupted error is assumed to be mounted.\n\t\t} else {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tif notmnt {\n\t\tklog.Warningf(\"Warning: Path: %v already unmounted\", deviceMountPath)\n\t} else {\n\t\tcall := d.plugin.NewDriverCall(unmountDeviceCmd)\n\t\tcall.Append(deviceMountPath)\n\n\t\t_, err := call.Run()\n\t\tif isCmdNotSupportedErr(err) {\n\t\t\terr = (*detacherDefaults)(d).UnmountDevice(deviceMountPath)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\t// Flexvolume driver may remove the directory. Ignore if it does.\n\tif pathExists, pathErr := mount.PathExists(deviceMountPath); pathErr != nil {\n\t\treturn fmt.Errorf(\"error checking if path exists: %w\", pathErr)\n\t} else if !pathExists {\n\t\treturn nil\n\t}\n\treturn os.Remove(deviceMountPath)\n}", "title": "" }, { "docid": "daf8b379fbac83b71575859a28c7dea4", "score": "0.59956825", "text": "func unmountVol(path string) error {\n\treturn syscall.Unmount(path, 0)\n}", "title": "" }, { "docid": "ac3c4aecf1b080d4f4746b9b1cd533fe", "score": "0.5946444", "text": "func removePath(mountPath string) error {\n\tklog.V(4).Infof(\"Warning: deleting path %q\", mountPath)\n\terr := os.Remove(mountPath)\n\tif os.IsNotExist(err) {\n\t\tklog.V(4).Infof(\"%q does not exist\", mountPath)\n\t\treturn nil\n\t}\n\treturn err\n}", "title": "" }, { "docid": "e031bc2553e99559110c352aed97e6c2", "score": "0.5919323", "text": "func Unmount(args []string) (string, error) {\n\tutil.LogDebug.Printf(\"Unmount called with %v\", args)\n\tmountID, err := getMountID(args[0])\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tdevPath, err := linux.GetDeviceFromMountPoint(args[0])\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tutil.LogDebug.Printf(\"Umount of \\\"%s\\\" from %s\", args[0], devPath)\n\terr = linux.BindUnmount(args[0])\n\tif err != nil && !strings.Contains(err.Error(), notMounted) {\n\t\treturn \"\", err\n\t}\n\n\tdockerPath, metadata, err := retryGetDockerPathAndMetadata(args[0], devPath)\n\tif err != nil && !strings.Contains(strings.ToLower(err.Error()), noFileOrDirErr) {\n\t\treturn \"\", err\n\t}\n\n\tdockerVolumeName, err := retryGetVolumeNameFromMountPath(args[0], dockerPath)\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\tutil.LogDebug.Printf(\"docker unmount of %s %s\", dockerVolumeName, mountID)\n\terr = dvp.Unmount(dockerVolumeName, mountID)\n\tif err != nil && !strings.Contains(err.Error(), notMounted) {\n\t\treturn \"\", err\n\t}\n\n\tif metadata != \"\" {\n\t\tdockerVolumeName, err = getVolumeNameFromMountPath(args[0], dockerPath)\n\t\tif err != nil {\n\t\t\t// an error means that we didn't find the volume mounted\n\t\t\t// this means we can clean up the breadcrumbs\n\t\t\tutil.LogDebug.Printf(\"Unmount: removing metadata=%s\", metadata)\n\t\t\tos.Remove(metadata)\n\t\t}\n\t\tutil.LogDebug.Printf(\"Unmount: dockerVolumeName=%s still has an active mount at %s.\", dockerVolumeName, dockerPath)\n\t}\n\n\treturn BuildJSONResponse(&Response{Status: SuccessStatus}), nil\n}", "title": "" }, { "docid": "5a53ac31c85126ebadd215d45c2f47fb", "score": "0.58796215", "text": "func Umount(mountPath string) error {\n\tcmd := fmt.Sprintf(\"umount %s\", mountPath)\n\t_, err := Run(cmd)\n\tif err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "622860e13e4f58f885173d52a976f9ca", "score": "0.5764205", "text": "func (k *KV) MountPath(path string) (mount string, err error) {\n\tmount, _, err = k.mountForPath(path)\n\treturn\n}", "title": "" }, { "docid": "b20083929cd471dc29727bd0c76b6012", "score": "0.56644446", "text": "func DeletePath(w http.ResponseWriter, r *http.Request) {\n\tpath := chi.URLParam(r, \"path\")\n\tparsedPath, err := base64.URLEncoding.DecodeString(path)\n\n\tif err != nil {\n\t\trender.Render(w, r, payloads.ErrInvalidRequest(errors.New(\"Path is not correctly encoded\")))\n\t\treturn\n\t}\n\tparsedPathString := string(parsedPath)\n\n\tnumRows, err := models.LayerInstance().FileDirs.DeletePath(parsedPathString)\n\tif err != nil {\n\t\trender.Render(w, r, payloads.ErrInternalError(err))\n\t\treturn\n\t}\n\n\tif err := render.Render(w, r, payloads.NewDeleteResponse(numRows)); err != nil {\n\t\trender.Render(w, r, payloads.ErrRender(err))\n\t\treturn\n\t}\n}", "title": "" }, { "docid": "0c745ca1d5eb07bc53af38f3fe1dfeab", "score": "0.56604105", "text": "func (sfs *Sandboxfs) UnmountOnExit() error {\n\tif sfs.unmountHandle != nil {\n\t\t// already called\n\t\treturn nil\n\t}\n\n\t// create a temp file to serve as our sentinel\n\ttmp, err := ioutil.TempFile(\"\", \"sfs-unmount-\")\n\tif err != nil {\n\t\treturn fmt.Errorf(\"opening mount point: %v\", err)\n\t}\n\n\t// map that temp file into the sandbox\n\tsfs.Map(\"/.sfs-unmount\", tmp.Name(), false)\n\tsfs.outstandingRequests.Wait()\n\n\t// hold open a handle on the sentinel\n\tsfs.unmountHandle, err = os.Open(path.Join(sfs.MountPoint, \"/.sfs-unmount\"))\n\tif err != nil {\n\t\treturn fmt.Errorf(\"opening unmount sentinel in sandbox: %v\", err)\n\t}\n\n\t// we should be able to unlink the underlying file now\n\tos.Remove(tmp.Name())\n\n\t// send sandboxfs a SIGTERM so it exits whenever we close the handle, and\n\t// release it so that it survives us\n\tsfs.cmd.Process.Signal(syscall.SIGTERM)\n\tsfs.cmd.Process.Release()\n\n\treturn nil\n}", "title": "" }, { "docid": "cc27394c9f235df4c6b2824767f19985", "score": "0.56599104", "text": "func (c *CrosDisks) Unmount(ctx context.Context, devicePath string, options []string) (uint32, error) {\n\tvar status uint32\n\tif err := c.call(ctx, \"Unmount\", devicePath, options).Store(&status); err != nil {\n\t\treturn 0, err\n\t}\n\treturn status, nil\n}", "title": "" }, { "docid": "0c71af3ce7b8af459eb47252405597cd", "score": "0.5648227", "text": "func DeletePath(path string) error {\n\terr := os.RemoveAll(path)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "bf6d527eea64868e588685efe07659d0", "score": "0.561901", "text": "func (m *Mounts) Unmount(mnt *Mount, force bool) (ret *Mount, err error) {\n\tl := m.log.WithField(\"operation\", \"unmount\")\n\tif mnt.ID < 1 {\n\t\tl.Trace(\"unmount called with 0 ID\")\n\t\treturn nil, ErrNotFound\n\t}\n\teo := API.Store.Get(mnt.ID)\n\tif eo == nil {\n\t\tl.Tracef(\"unmount called on non-existent mount ID: %d\", mnt.ID)\n\t\treturn nil, ErrNotFound\n\t}\n\tdefer func() {\n\t\tAPI.Store.RefAdd(eo.GetID(), -1)\n\t}()\n\tvar ok bool\n\tif mnt, ok = eo.(*Mount); !ok {\n\t\tl.Trace(\"unmount called on non-mount object\")\n\t\treturn nil, ErrNotFound\n\t}\n\tl = l.WithFields(logrus.Fields{\n\t\t\"id\": mnt.ID,\n\t\t\"mountpoint\": mnt.Mountpoint,\n\t})\n\tif mnt.Refs > 1 && !force { // we hold 1 from our Get above\n\t\tl.Debug(\"unmount called on mount that is in use\")\n\t\treturn nil, ErrBusy\n\t}\n\t// two edge cases:\n\t// 1) mountpoint no longer exists. Technically, any stat error (could be perms).\n\tif _, err := os.Stat(mnt.Mountpoint); err != nil {\n\t\tAPI.Store.Unregister(mnt)\n\t\tl.Warn(\"unmount called on a mountpoint that no longer exists, assuming it's already unmounted\")\n\t\t// to the end user, we treat this as a successful unmount\n\t\treturn ret, nil\n\t}\n\t// 2) mountpoint isn't a mount (maybe we got unmounted already?)\n\tif !isMountpoint(mnt.Mountpoint) {\n\t\tAPI.Store.Unregister(mnt)\n\t\tl.Warn(\"mountpoint is not mounted, unregistering\")\n\t\tif rmerr := os.Remove(mnt.Mountpoint); rmerr != nil {\n\t\t\tl.WithError(rmerr).Warn(\"failed to remove mountpoint on unmount\")\n\t\t}\n\t\treturn ret, nil\n\t}\n\tif drv, ok := MountDrivers[mnt.Kind]; ok {\n\t\tl = l.WithField(\"driver\", mnt.Kind)\n\t\tret, err = drv.Unmount(mnt)\n\t\tif err == nil {\n\t\t\tif rmerr := os.Remove(mnt.Mountpoint); rmerr != nil {\n\t\t\t\tl.WithError(rmerr).Warn(\"failed to remove mountpoint on unmount\")\n\t\t\t}\n\t\t\tAPI.Store.Unregister(ret)\n\t\t\tl.Info(\"successfully unmounted\")\n\t\t}\n\t\treturn ret, err\n\t}\n\treturn nil, ErrNoDrv\n}", "title": "" }, { "docid": "8278ab03fd3c42e25abdbbe8e0ab9a69", "score": "0.5598847", "text": "func DeletePath(filePath string) {\n\terr := os.RemoveAll(filePath)\n\tpanicOnError(err)\n}", "title": "" }, { "docid": "beece33afdd5ac5a2b8ea7cdcb642ada", "score": "0.552444", "text": "func RemovePath(testPath string, t *testing.T) {\n\terr := fileutils.RemovePath(testPath)\n\tif err != nil {\n\t\tt.Error(err)\n\t\tt.FailNow()\n\t}\n}", "title": "" }, { "docid": "7ae70a2c87bbdedcc9a158b1d1b5ae18", "score": "0.550967", "text": "func Unmount(dest string) error {\n\treturn unix.Unmount(dest, 0)\n}", "title": "" }, { "docid": "f3ac363209850e98278ba88f92941910", "score": "0.54827005", "text": "func (volume *Volume) CleanPath(path string) string {\n\tpath = strings.Replace(path, \"../\", \"\", -1)\n\treturn strings.Replace(path, \"..\", \"\", -1)\n}", "title": "" }, { "docid": "a5b350f73317cd68fee9678dfa679989", "score": "0.5416389", "text": "func DeletePath(c *gin.Context) {\n\tvar rootPath = os.Getenv(\"ROOT_PATH\")\n\tvar pathDelete models.PathDelete\n\n\terr := c.BindJSON(&pathDelete)\n\n\t// Check formatting\n\tif err != nil {\n\t\tc.JSON(400, gin.H{\"Incorrect input data\": err.Error()})\n\t\treturn\n\t}\n\n\tvar path string = rootPath + pathDelete.Path\n\n\tcmd := exec.Command(\"rm\", \"-rf\", path)\n\t_, err = cmd.Output()\n\n\tif err != nil {\n\t\tc.JSON(400, gin.H{\"Error during remove\": err.Error()})\n\t\treturn\n\t}\n\n\tc.JSON(200, pathDelete.Path)\n\treturn\n}", "title": "" }, { "docid": "813868d287b955622ce2338187fad317", "score": "0.53459567", "text": "func (k *KV) Undelete(path string, versions []uint) (err error) {\n\tmountPath, mount, err := k.mountForPath(path)\n\tif err != nil {\n\t\treturn\n\t}\n\n\tpath = subtractMount(mountPath, path)\n\treturn mount.Undelete(mountPath, path, versions)\n}", "title": "" }, { "docid": "b34e628064af7061c4a453be3b4988b8", "score": "0.53317815", "text": "func (s *Storage) unmountStorage(c *config.Config, ctx *args.Context) error {\n\tpath := ctx.String(\"path\")\n\tif path == \"\" {\n\t\tpath = c.ChooseResource()\n\t}\n\tif _, err := c.LoadResource(path); err != nil {\n\t\treturn exception(\"Resource %s could not find in your project.\\n\", path)\n\t}\n\trs, err := c.LoadResource(path + \"/{proxy+}\")\n\tif err != nil {\n\t\treturn exception(\"Proxy resource could not find in %s.\\n\", path)\n\t}\n\n\t// On storage integration, we only support \"GET\" method.\n\tmethod := \"GET\"\n\tig := rs.GetIntegration(method)\n\tif ig == nil {\n\t\treturn exception(\"No integration found, Abort.\")\n\t}\n\tswitch ig.IntegrationType {\n\tcase \"lambda\":\n\t\treturn exception(\"Lambda function already integrated. to remove it, run 'ginger function unmount'.\")\n\tcase \"s3\":\n\t\tif rs.Id != \"\" {\n\t\t\tapi := request.NewAPIGateway(c)\n\t\t\tapi.DeleteMethod(c.RestApiId, rs.Id, method)\n\t\t\tapi.DeleteIntegration(c.RestApiId, rs.Id, method)\n\t\t}\n\t\trs.DeleteIntegration(method)\n\tdefault:\n\t\treturn exception(\"Undefined integration type.\")\n\t}\n\ts.log.Infof(\"Storage unmounted for resource %s.\\n\", path)\n\treturn nil\n}", "title": "" }, { "docid": "677cbe38e6c8539a6b3aa29e98999552", "score": "0.5315004", "text": "func Unmount(target string) error {\n\treturn unmount(target)\n}", "title": "" }, { "docid": "693741903861309ca0c43a151a6f970b", "score": "0.5301885", "text": "func (mounter *winMounter) Unmount(target string) error {\n\tklog.V(4).Infof(\"Unmount: %s\", target)\n\treturn mounter.Rmdir(target)\n}", "title": "" }, { "docid": "8136b6a10cb5d8bf54eaa5c0e660b33c", "score": "0.5288931", "text": "func (d *workstation) Unmount() error {\n\tif d.writable {\n\t\tfmt.Printf(\"[+] Unmounting: %s\\n\", d.mount.deviceName)\n\t\tstdout, err := help.ExecCmd(diskUtil,\n\t\t\t[]string{\n\t\t\t\t\"unmountDisk\",\n\t\t\t\td.mount.diskName,\n\t\t\t})\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"error unmounting disk: %s\\n[-] Cause: %s\", d.mount.diskName, stdout)\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "60d1cea40be644ed4aac5e476c8850e9", "score": "0.5287594", "text": "func (mount *MountInfo) Unlink(path string) error {\n\tif err := mount.validate(); err != nil {\n\t\treturn err\n\t}\n\tcPath := C.CString(path)\n\tdefer C.free(unsafe.Pointer(cPath))\n\n\tret := C.ceph_unlink(mount.mount, cPath)\n\treturn getError(ret)\n}", "title": "" }, { "docid": "cead984f407d60f9607026891e086735", "score": "0.5280345", "text": "func (v VolumePathHandler) RemoveMapPath(mapPath string) error {\n\tif len(mapPath) == 0 {\n\t\treturn fmt.Errorf(\"failed to remove map path. mapPath is empty\")\n\t}\n\tklog.V(5).Infof(\"RemoveMapPath: mapPath %s\", mapPath)\n\terr := os.RemoveAll(mapPath)\n\tif err != nil && !os.IsNotExist(err) {\n\t\treturn fmt.Errorf(\"failed to remove directory %s: %v\", mapPath, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "e17401ac94b2201c04780044de215cf6", "score": "0.52783704", "text": "func GetUnmountPath(ctx context.Context, trackingInfo *VolumeTrackingInfo) (string, error) {\n\tLogc(ctx).Debug(\">>>> filesystem_darwin.GetUnmountPath\")\n\tdefer Logc(ctx).Debug(\"<<<< filesystem_darwin.GetUnmountPath\")\n\n\treturn \"\", errors.UnsupportedError(\"GetUnmountPath is not supported for darwin\")\n}", "title": "" }, { "docid": "3db8ac09b54e419fedc9d478ab488108", "score": "0.5262453", "text": "func (o GoogleCloudRunV2VolumeMountOutput) MountPath() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GoogleCloudRunV2VolumeMount) string { return v.MountPath }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "77d77ba65e9eef5c17669149aa2b4f24", "score": "0.5235064", "text": "func UmountAndRemoveTemporaryMountPoint(mountPath string) error {\n\tlog.Debug(\">>>> osutils.UmountAndRemoveTemporaryMountPoint\")\n\tdefer log.Debug(\"<<<< osutils.UmountAndRemoveTemporaryMountPoint\")\n\n\t// Delete the temporary mount point if it exists.\n\ttmpDir := path.Join(mountPath, temporaryMountDir)\n\tif _, err := os.Stat(tmpDir); err == nil {\n\t\tif err = removeMountPoint(tmpDir); err != nil {\n\t\t\treturn fmt.Errorf(\"failed to remove directory in staging target path %s; %s\", tmpDir, err)\n\t\t}\n\t} else if !os.IsNotExist(err) {\n\t\tlog.WithField(\"temporaryMountPoint\", tmpDir).Errorf(\"Can't determine if temporary dir path exists; %s\", err)\n\t\treturn fmt.Errorf(\"can't determine if temporary dir path %s exists; %s\", tmpDir, err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "54de873fd5e1deccd96238385b9eae7d", "score": "0.5227515", "text": "func (o GoogleCloudRunV2VolumeMountResponseOutput) MountPath() pulumi.StringOutput {\n\treturn o.ApplyT(func(v GoogleCloudRunV2VolumeMountResponse) string { return v.MountPath }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "b58a94f2290303f7f3e39d6629574d13", "score": "0.5213545", "text": "func (m *Monitor) Unmount() error {\n\tm.Lock()\n\tdefer m.Unlock()\n\tm.unmount <- struct{}{}\n\treturn nil\n}", "title": "" }, { "docid": "a9a96c82ed834cfbd293987d017542d7", "score": "0.5212068", "text": "func (mount *MountInfo) RemoveDir(path string) error {\n\tif err := mount.validate(); err != nil {\n\t\treturn err\n\t}\n\tcPath := C.CString(path)\n\tdefer C.free(unsafe.Pointer(cPath))\n\n\tret := C.ceph_rmdir(mount.mount, cPath)\n\treturn getError(ret)\n}", "title": "" }, { "docid": "3f89622612c7e415cd1ce02f53bbd1fb", "score": "0.5206803", "text": "func (this *HttpAPI) Unmount(params martini.Params, r render.Render, req *http.Request) {\n\tif err := this.validateToken(r, req); err != nil {\n\t\treturn\n\t}\n\toutput, err := osagent.Unmount(config.Config.SnapshotMountPoint)\n\tif err != nil {\n\t\tr.JSON(500, &APIResponse{Code: ERROR, Message: err.Error()})\n\t\treturn\n\t}\n\tr.JSON(200, output)\n}", "title": "" }, { "docid": "3ff98fe43f788ea31cf7cd3c1acca151", "score": "0.51977754", "text": "func (c *cryptohomeBinary) unmount(ctx context.Context, username string) ([]byte, error) {\n\treturn c.call(ctx, \"--action=unmount\", \"--user=\"+username)\n}", "title": "" }, { "docid": "f0bc611474c3973ab4cd635dbab02e70", "score": "0.5186536", "text": "func UnveilPath(_ string, _ string) error {\n\treturn nil\n}", "title": "" }, { "docid": "9c26ee5628ea3a7f57aa734f17b38ef8", "score": "0.5164855", "text": "func (c *BtrfsConn) Unmount() error {\n\tsnapshots, err := c.Snapshots()\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tfor _, snapshot := range snapshots {\n\t\tif err := c.RemoveSnapshot(snapshot); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tc.Lock()\n\tdefer c.Unlock()\n\t_, err = runcmd(c.sudoer, \"subvolume\", \"delete\", c.Path())\n\treturn err\n}", "title": "" }, { "docid": "1b8ec57c59329d2ead1132d2b7d421c5", "score": "0.51644295", "text": "func (mount *MountInfo) Unmount() error {\n\tret := C.ceph_unmount(mount.mount)\n\tif ret != 0 {\n\t\tlog.Errorf(\"Unmount: Failed to unmount\")\n\t\treturn cephError(ret)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f90b6d9d2b3ce1ac8e83e8cc4199f2d0", "score": "0.5139404", "text": "func (s LinuxProvider) Unmount(target string, flags int) error {\n\t// umount(2) in Linux doesn't allow unmount of a block device\n\tif isDevice(target) {\n\t\tmntPoint, err := resolveDeviceMount(target)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t\ttarget = mntPoint\n\t}\n\treturn unix.Unmount(target, flags)\n}", "title": "" }, { "docid": "0eaa21a6c6dd778687f12cb3e74d7a5f", "score": "0.5121852", "text": "func (domain *Domain) DeletePath() {\n\tos.RemoveAll(domain.writablePath())\n}", "title": "" }, { "docid": "d69010ee44e51abd153c9e8b5fab9e9e", "score": "0.5114695", "text": "func (file *File) CleanPath(volumePath string) string {\n\t// Clean the path up\n\tPath := \"\"\n\tPath = strings.ReplaceAll(file.Path, \"//\", \"/\")\n\tPath = strings.ReplaceAll(Path, \"/\", \"/\")\n\tPath = strings.Replace(Path, volumePath, \"\", 1)\n\treturn Path\n}", "title": "" }, { "docid": "a3299846b90762418ee08df2891ed6af", "score": "0.5112634", "text": "func (sfs *Sandboxfs) Unmount(timeout time.Duration) error {\n\tif sfs.unmountHandle != nil {\n\t\treturn fmt.Errorf(\"Unmount cannot be called after UnmountOnExit\")\n\t}\n\n\tsfs.cancel()\n\tsfs.cmd.Process.Signal(syscall.SIGTERM)\n\n\tstopped := make(chan error)\n\tgo func() {\n\t\tstopped <- sfs.cmd.Wait()\n\t\tclose(stopped)\n\t}()\n\n\tselect {\n\tcase err := <-stopped:\n\t\tif _, ok := err.(*exec.ExitError); !ok {\n\t\t\t// this is an error that is *not* ExitError\n\t\t\treturn err\n\t\t} else {\n\t\t\treturn nil\n\t\t}\n\tcase <-time.After(timeout):\n\t\tsfs.cmd.Process.Kill()\n\t\treturn fmt.Errorf(\"killed sandboxfs after timeout\")\n\t}\n}", "title": "" }, { "docid": "724bfab04bff450ef45dead9ef074f95", "score": "0.5105104", "text": "func (d *S3fsDriver) Unmount(req *volume.UnmountRequest) error {\n\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"unmount\").Debugf(\"request: %+v\", req)\n\t// get volume configurtion\n\t// get volume config\n\tvolConfig, err := d.getVolumeConfig(req.Name)\n\tif err != nil {\n\t\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"unmount\").Errorf(\"could not get vol infos: %s\", err)\n\t\treturn fmt.Errorf(\"could not get vol infos: %s\", err)\n\t}\n\t// aquire mount lock\n\td.mountsLock.Lock()\n\tdefer d.mountsLock.Unlock()\n\t// check that volume was mounted at least once\n\tif _, ok := d.mounts[volConfig.Name]; !ok {\n\t\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"unmount\").Errorf(\"could not find mount infos for %s\", volConfig.Name)\n\t\treturn fmt.Errorf(\"could not find mount infos for %s\", volConfig.Name)\n\t}\n\tif d.mounts[volConfig.Name] <= 0 {\n\t\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"unmount\").Errorf(\"volume %s is apparently not mouted\", volConfig.Name)\n\t\treturn fmt.Errorf(\"volume %s is apparently not mouted\", volConfig.Name)\n\t}\n\t// check if other container still have this mounted\n\tif d.mounts[volConfig.Name] > 1 {\n\t\td.mounts[volConfig.Name]--\n\t\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"unmount\").Infof(\"volume %s is used by %d containers\", volConfig.Name, d.mounts[volConfig.Name])\n\t\treturn nil\n\t}\n\t// generate mount path\n\tpath := fmt.Sprintf(\"%s/%s\", d.RootMount, volConfig.Name)\n\t// unmount volume\n\t// generate command\n\tcmd := fmt.Sprintf(\"umount %s\", path)\n\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"unmount\").Infof(\"cmd: %s\", cmd)\n\terr = exec.Command(\"sh\", \"-c\", cmd).Run()\n\tif err != nil {\n\t\tswitch e := err.(type) {\n\t\tcase *exec.ExitError:\n\t\t\tif len(e.Stderr) > 0 {\n\t\t\t\tmessage := strings.ReplaceAll(string(e.Stderr), \"\\n\", \"\\\\n\")\n\t\t\t\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"umount\").Errorf(\"error executing the umount command: '%s'\", message)\n\t\t\t\treturn fmt.Errorf(\"error executing the umount command: '%s'\", message)\n\t\t\t}\n\t\t\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"umount\").Errorf(\"error executing the umount command: %s\", err)\n\t\t\treturn fmt.Errorf(\"error executing the umount command: %s\", err)\n\t\tdefault:\n\t\t\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"umount\").Errorf(\"error executing the umount command: %s\", err)\n\t\t\treturn fmt.Errorf(\"error executing the umount command: %s\", err)\n\t\t}\n\t}\n\td.mounts[volConfig.Name]--\n\tlog.WithField(\"command\", \"driver\").WithField(\"method\", \"unmount\").Infof(\"volume %s is used by %d containers\", volConfig.Name, d.mounts[volConfig.Name])\n\treturn nil\n}", "title": "" }, { "docid": "f94df7e83d26d56fcbc0e1f45d1b2eca", "score": "0.5098858", "text": "func (mounter *NodeMounter) Unmount(target string) error {\n\tklog.V(4).Infof(\"Unmounting %s\", target)\n\tcommand := exec.Command(\"umount\", target)\n\toutput, err := command.CombinedOutput()\n\tif err != nil {\n\t\treturn fmt.Errorf(\"unmount failed: %v\\nUnmounting arguments: %s\\nOutput: %s\", err, target, string(output))\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2a2680abc76a52219684db171bd111fe", "score": "0.5091118", "text": "func (g *GraphTool) Unmount(target string) error {\n\treturn syscall.Unmount(target, 0)\n}", "title": "" }, { "docid": "41bff2b2383ed6a17398e85abcbd7da4", "score": "0.5079739", "text": "func PrepareDeviceAtMountPathForRemoval(mountpoint string, unmount bool) error {\n\n\tfields := log.Fields{\"mountpoint\": mountpoint}\n\tlog.WithFields(fields).Debug(\">>>> osutils.PrepareDeviceAtMountPathForRemoval\")\n\tdefer log.WithFields(fields).Debug(\"<<<< osutils.PrepareDeviceAtMountPathForRemoval\")\n\n\tdeviceInfo, err := getDeviceInfoForMountPath(mountpoint)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif unmount {\n\t\tif err := Umount(mountpoint); err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\n\tremoveSCSIDevice(deviceInfo)\n\treturn nil\n}", "title": "" }, { "docid": "326dde1efae6bfacdfbe6ec2fb7d0b94", "score": "0.5067933", "text": "func doCleanupMountPoint(mountPath string, mounter Interface, extensiveMountPointCheck bool, corruptedMnt bool) error {\n\tif corruptedMnt || mounter.CanSafelySkipMountPointCheck() {\n\t\tklog.V(4).Infof(\"unmounting %q (corruptedMount: %t, mounterCanSkipMountPointChecks: %t)\",\n\t\t\tmountPath, corruptedMnt, mounter.CanSafelySkipMountPointCheck())\n\t\tif err := mounter.Unmount(mountPath); err != nil {\n\t\t\treturn err\n\t\t}\n\t\treturn removePath(mountPath)\n\t}\n\n\tnotMnt, err := removePathIfNotMountPoint(mountPath, mounter, extensiveMountPointCheck)\n\t// if mountPath is not a mount point, it's just been removed or there was an error\n\tif err != nil || notMnt {\n\t\treturn err\n\t}\n\n\tklog.V(4).Infof(\"%q is a mountpoint, unmounting\", mountPath)\n\tif err := mounter.Unmount(mountPath); err != nil {\n\t\treturn err\n\t}\n\n\tnotMnt, err = removePathIfNotMountPoint(mountPath, mounter, extensiveMountPointCheck)\n\t// if mountPath is not a mount point, it's either just been removed or there was an error\n\tif notMnt {\n\t\treturn err\n\t}\n\t// mountPath is still a mount point\n\treturn fmt.Errorf(\"failed to cleanup mount point %v\", mountPath)\n}", "title": "" }, { "docid": "fb68d6a7fb01a9957fe7814bfc670cdc", "score": "0.5062376", "text": "func (container *Container) Unmount() error {\n\treturn container.daemon.unmount(container)\n}", "title": "" }, { "docid": "e7501ae67951a64186a73dd90765ff3b", "score": "0.5060616", "text": "func Umount(mountpoint string) (err error) {\n\n\tlog.WithField(\"mountpoint\", mountpoint).Debug(\">>>> osutils.Umount\")\n\tdefer log.Debug(\"<<<< osutils.Umount\")\n\n\tif _, err = execCommand(\"umount\", mountpoint); err != nil {\n\t\tlog.WithField(\"error\", err).Error(\"Umount failed.\")\n\t}\n\treturn\n}", "title": "" }, { "docid": "ff7512644ffaa986fe704b498bab60cf", "score": "0.5056452", "text": "func (VolumeAPI) UnmountVolume(volumeID, path string) error {\n\tif err := writeCache(volumeID); err != nil {\n\t\treturn err\n\t}\n\tcmd := fmt.Sprintf(\"Get-Volume -UniqueId \\\"%s\\\" | Get-Partition | Remove-PartitionAccessPath -AccessPath %s\", volumeID, path)\n\tout, err := runExec(cmd)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error getting driver letter to mount volume. cmd: %s, output: %s,error: %v\", cmd, string(out), err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "d0c5dd0aba7ff8daf2041dea7ecc555e", "score": "0.50479215", "text": "func (mount *MountInfo) RemoveDir(path string) error {\n\tcPath := C.CString(path)\n\tdefer C.free(unsafe.Pointer(cPath))\n\n\tret := C.ceph_rmdir(mount.mount, cPath)\n\tif ret != 0 {\n\t\tlog.Errorf(\"RemoveDir: Failed to remove directory\")\n\t\treturn cephError(ret)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "876bf9c439a469335de64c1225fedce5", "score": "0.50425416", "text": "func (rd *RbdDriver) Unmount(req *volume.UnmountRequest) error {\n\tlog.WithField(\"request\", req).Debug(\"unmount\")\n\n\t_, log, unlock := rd.imgReqInit(req.Name)\n\tdefer unlock()\n\n\timg, err := rd.getImg(req.Name)\n\tif err != nil {\n\t\treturn fmt.Errorf(\"error in driver unmount: %w\", err)\n\t}\n\n\tmp := rd.mountPoint(img)\n\terr = img.UnmountAndUnmap(mp)\n\tif err != nil {\n\t\tif errors.Is(err, rbd.ErrMountedElsewhere) {\n\t\t\tlog.WithError(err).Info(\"device still in use, not unmounting\")\n\t\t\treturn nil\n\t\t}\n\t\tlog.WithError(err).Error(\"error in driver unmount\")\n\t\treturn fmt.Errorf(\"error in driver unmount: %w\", err)\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "42e4f660d2a81755cb9afe5918ce72d0", "score": "0.503256", "text": "func CleanupMountPoint(mountPath string, mounter Interface, extensiveMountPointCheck bool) error {\n\tpathExists, pathErr := PathExists(mountPath)\n\tif !pathExists && pathErr == nil {\n\t\tklog.Warningf(\"Warning: mount cleanup skipped because path does not exist: %v\", mountPath)\n\t\treturn nil\n\t}\n\tcorruptedMnt := IsCorruptedMnt(pathErr)\n\tif pathErr != nil && !corruptedMnt {\n\t\treturn fmt.Errorf(\"Error checking path: %v\", pathErr)\n\t}\n\treturn doCleanupMountPoint(mountPath, mounter, extensiveMountPointCheck, corruptedMnt)\n}", "title": "" }, { "docid": "07afa91b8a44316bd111f1beede1243c", "score": "0.5022083", "text": "func unmountVolume(ctx context.Context, fsType FSType, mp string) error {\n\tbin, args, err := fsType.UnmountCommand(mp)\n\tif err == nil {\n\t\t_, err = runCmd(ctx, bin, args...)\n\t}\n\n\t// If either the command generation, or the unmount command execution failed\n\tif err != nil {\n\t\tlog.Errorf(\"Unmount failed: %s (%s)\", mp, err)\n\t\treturn err\n\t}\n\tlog.Debugf(\"Unmounted volume: %s\", mp)\n\n\treturn nil\n}", "title": "" }, { "docid": "1b20c54d2267b58f1529771b74f90ff2", "score": "0.5017844", "text": "func (fs *FileboxFileSystem) Unlink(path string) int {\n\tlog.Tracef(\"Deleting file %s\", path)\n\n\tif _, ok := fs.Client.SendReceive(protocol.DeleteFileRequest{path}); !ok {\n\t\tlog.WithField(\"path\", path).Error(\"Truncate failed\")\n\t\treturn -fuse.EIO\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "5abcd61deb2222d9b017c98220e629c3", "score": "0.50104684", "text": "func (cs *ControllerServer) internalUnmount(ctx context.Context, vol *nfsVolume) error {\n\ttargetPath := cs.getInternalMountPath(vol)\n\n\t// Unmount nfs server at base-dir\n\tklog.V(4).Infof(\"internally unmounting %v\", targetPath)\n\t_, err := cs.Driver.ns.NodeUnpublishVolume(ctx, &csi.NodeUnpublishVolumeRequest{\n\t\tVolumeId: vol.id,\n\t\tTargetPath: cs.getInternalMountPath(vol),\n\t})\n\treturn err\n}", "title": "" }, { "docid": "4632469de21c0a70bdb4033d4a1ab238", "score": "0.4993601", "text": "func (fs *fsAdapter) Rmdir(dirPath string) error {\n\tstat, err := fs.impl.Stat(dirPath)\n\tif os.IsNotExist(err) {\n\t\treturn nil // doesnt exist, pretend we successfully removed it\n\t}\n\tif err != nil {\n\t\treturn fmt.Errorf(\"stat call failed: %w\", err)\n\t}\n\tif !stat.IsDir() {\n\t\treturn os.ErrInvalid\n\t}\n\t// FIXME:\n\t// IEEE 1003.1: If pathname is a symlink, then rmdir should fail with ENOTDIR.\n\n\t// IEEE 1003.1: if oldpath is a directory, and newpath exists,\n\t// then newpath must be a directory, and empty.\n\t// It is to be removed prior to rename.\n\n\t// IEEE 1003.1: if oldpath is not a directory, and newpath exists,\n\t// then newpath may not be a directory.\n\n\treturn fs.impl.Remove(dirPath)\n}", "title": "" }, { "docid": "3ccf59f465af9aa5d8946b767f4ec7e2", "score": "0.4971245", "text": "func (zd *ZfsDriver) Unmount(req *volume.UnmountRequest) error {\n\tlog.WithField(\"Request\", req).Debug(\"Unmount\")\n\treturn nil\n}", "title": "" }, { "docid": "7d65713867446be8261cfcfb2bf9542f", "score": "0.4950915", "text": "func (a *AdjRIBIn) RemovePath(pfx *net.Prefix, p *route.Path) bool {\n\ta.mu.Lock()\n\tdefer a.mu.Unlock()\n\n\treturn a.removePath(pfx, p)\n}", "title": "" }, { "docid": "8e2cd24a76ea29ff4dc4483f04c36876", "score": "0.49426976", "text": "func UnmountTempFS(dir string, fstype string) error {\n\terr := unix.Unmount(dir, 0)\n\tif err != nil {\n\t\tglog.V(2).Infof(\"Couldn't unmount %s at %s: %s\", fstype, dir, err)\n\t\treturn err\n\t}\n\n\terr = os.Remove(dir)\n\tif err != nil {\n\t\tglog.V(2).Infof(\"Couldn't remove %s: %s\", dir, err)\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "bdd076aeb31ab011f827b467685c66bb", "score": "0.49421263", "text": "func (o AppImageConfigFileSystemConfigOutput) MountPath() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v AppImageConfigFileSystemConfig) *string { return v.MountPath }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "394216e0a58e4c32c5309a70f6ed4b6e", "score": "0.49364832", "text": "func removeMountPoint(mountPointPath string) error {\n\tlog.Debug(\">>>> osutils.removeMountPoint\")\n\tdefer log.Debug(\"<<<< osutils.removeMountPoint\")\n\n\terr := Umount(mountPointPath)\n\tif err != nil {\n\t\tlog.WithField(\"mountPointPath\", mountPointPath).Errorf(\"Umount failed; %s\", err)\n\t\treturn err\n\t}\n\n\terr = os.Remove(mountPointPath)\n\tif err != nil {\n\t\tlog.WithField(\"mountPointPath\", mountPointPath).Errorf(\"Remove dir failed; %s\", err)\n\t\treturn fmt.Errorf(\"failed to remove dir %s; %s\", mountPointPath, err)\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "fd4146fb05ac721a9ef083b2292b2908", "score": "0.49322575", "text": "func (b *FileBackend) cleanupLogicalPath(path string) error {\n\tnodes := strings.Split(path, fmt.Sprintf(\"%c\", os.PathSeparator))\n\tfor i := len(nodes) - 1; i > 0; i-- {\n\t\tfullPath := filepath.Join(b.path, filepath.Join(nodes[:i]...))\n\n\t\tdir, err := os.Open(fullPath)\n\t\tif err != nil {\n\t\t\tif dir != nil {\n\t\t\t\tdir.Close()\n\t\t\t}\n\t\t\tif os.IsNotExist(err) {\n\t\t\t\treturn nil\n\t\t\t} else {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\n\t\tlist, err := dir.Readdir(1)\n\t\tdir.Close()\n\t\tif err != nil && err != io.EOF {\n\t\t\treturn err\n\t\t}\n\n\t\t// If we have no entries, it's an empty directory; remove it\n\t\tif err == io.EOF || list == nil || len(list) == 0 {\n\t\t\terr = os.Remove(fullPath)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t}\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "a61eee698a34a6b7e988b840d2fbd22c", "score": "0.49249157", "text": "func CleanPath(path string) string {\n\treturn filepath.ToSlash(filepath.Clean(path))\n}", "title": "" }, { "docid": "1a3e2381a11dfcb437306e1af816a139", "score": "0.4918754", "text": "func DoUnmount(dir string) {\n\terr := unmountErr(dir)\n\tif err != nil {\n\t\ttlog.Warn.Println(err)\n\t\tpanic(err)\n\t}\n}", "title": "" }, { "docid": "3a054574bf5dfe512ecb85899f0cb149", "score": "0.49176046", "text": "func SyncPath(path string) error {\n\tvar err error\n\tf, _, err := OpenPath(path)\n\tif err != nil {\n\t\terr = stacktrace.Propagate(err, \"could not sync path '%s'\", path)\n\t\treturn err\n\t}\n\n\terr = f.Sync()\n\tif err != nil {\n\t\t_ = f.Close()\n\t\terr = stacktrace.Propagate(err, \"could not flush path '%s' to disk\", path)\n\t\treturn err\n\t}\n\terr = f.Close()\n\tif err != nil {\n\t\terr = stacktrace.Propagate(err, \"could not close file descriptor at '%s' to disk\", path)\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "2f4d03dd7e652154ec791217fdcd94be", "score": "0.4895646", "text": "func (ns *unixnamespace) Unmount(new string, old string) error {\n\tpanic(\"not implemented\") // TODO: Implement\n}", "title": "" }, { "docid": "f3ef7d5cf8aa0729953167278d152b6b", "score": "0.4893651", "text": "func RmIfExist(fPath string) error { return DeleteIfExist(fPath) }", "title": "" }, { "docid": "eb5e765be6ce44e2c87c49902e91def2", "score": "0.48762572", "text": "func (d *LUKSDevice) MountedPath() string {\n\tif d.mapped == nil {\n\t\treturn \"\"\n\t}\n\treturn d.mapped.MountedPath()\n}", "title": "" }, { "docid": "2bd28e820f5bff54b28d56ccde865101", "score": "0.48677343", "text": "func (i *ImageService) Unmount(ctx context.Context, container *container.Container) error {\n\tif container.RWLayer == nil {\n\t\treturn errors.New(\"RWLayer of container \" + container.ID + \" is unexpectedly nil\")\n\t}\n\tif err := container.RWLayer.Unmount(); err != nil {\n\t\tlog.G(ctx).WithField(\"container\", container.ID).WithError(err).Error(\"error unmounting container\")\n\t\treturn err\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "ffd39a95ae2b5eb6d5562f28dc766e04", "score": "0.48662156", "text": "func (v VolumePathHandler) UnmapDevice(mapPath string, linkName string, bindMount bool) error {\n\tif len(mapPath) == 0 {\n\t\treturn fmt.Errorf(\"failed to unmap device from map path. mapPath is empty\")\n\t}\n\tklog.V(5).Infof(\"UnmapDevice: mapPath %s\", mapPath)\n\tklog.V(5).Infof(\"UnmapDevice: linkName %s\", linkName)\n\n\tif bindMount {\n\t\treturn unmapBindMountDevice(v, mapPath, linkName)\n\t}\n\treturn unmapSymlinkDevice(v, mapPath, linkName)\n}", "title": "" }, { "docid": "b602448e25c80f1bd34fa82147f0cca8", "score": "0.48536557", "text": "func (rpcapi *ClusterRPCAPI) UnpinPath(ctx context.Context, in api.PinPath, out *api.Pin) error {\n\tpin, err := rpcapi.c.UnpinPath(ctx, in.Path)\n\tif err != nil {\n\t\treturn err\n\t}\n\t*out = pin\n\treturn nil\n}", "title": "" }, { "docid": "1d116af4b3d63ccec798a7a6ad00293b", "score": "0.48463184", "text": "func (n *NsenterMounter) Unmount(target string) error {\n\targs := []string{\n\t\t\"--mount=/rootfs/proc/1/ns/mnt\",\n\t\t\"--\",\n\t\tn.absHostPath(\"umount\"),\n\t\ttarget,\n\t}\n\n\tglog.V(5).Infof(\"Unmount command: %v %v\", nsenterPath, args)\n\texec := exec.New()\n\toutputBytes, err := exec.Command(nsenterPath, args...).CombinedOutput()\n\tif len(outputBytes) != 0 {\n\t\tglog.V(5).Infof(\"Output from mount command: %v\", string(outputBytes))\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "64f0c07cb6c30e6c909e199ed281fe00", "score": "0.48443863", "text": "func (mounter *winMounter) Rmdir(path string) error {\n\treturn filesystem.Rmdir(normalizeWindowsPath(path), true)\n}", "title": "" }, { "docid": "f9deff0425b649fdca4f0391ccd4dc42", "score": "0.48382273", "text": "func Rmdir(path string) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(path)\n\tif err != nil {\n\t\treturn\n\t}\n\t_, _, e1 := sysvicall6(uintptr(unsafe.Pointer(&procRmdir)), 1, uintptr(unsafe.Pointer(_p0)), 0, 0, 0, 0, 0)\n\tif e1 != 0 {\n\t\terr = e1\n\t}\n\treturn\n}", "title": "" }, { "docid": "9344f195d1af082f52b2707a9209fb86", "score": "0.48333853", "text": "func (m *volumeMounter) Unmount(vmi *v1.VirtualMachineInstance) error {\n\tif vmi.UID != \"\" {\n\t\trecord, err := m.getMountTargetRecord(vmi)\n\t\tif err != nil {\n\t\t\treturn err\n\t\t} else if record == nil {\n\t\t\t// no entries to unmount\n\t\t\treturn nil\n\t\t}\n\t\tif len(record.MountTargetEntries) == 0 {\n\t\t\treturn nil\n\t\t}\n\n\t\tcurrentHotplugPaths := make(map[string]types.UID, 0)\n\t\tvirtlauncherUID := m.findVirtlauncherUID(vmi)\n\n\t\tbasePath, err := m.hotplugDiskManager.GetHotplugTargetPodPathOnHost(virtlauncherUID)\n\t\tif err != nil {\n\t\t\tif errors.Is(err, os.ErrNotExist) {\n\t\t\t\t// no mounts left, the base path does not even exist anymore\n\t\t\t\tif err := m.deleteMountTargetRecord(vmi); err != nil {\n\t\t\t\t\treturn fmt.Errorf(\"failed to delete mount target records: %v\", err)\n\t\t\t\t}\n\t\t\t\treturn nil\n\t\t\t}\n\t\t\treturn err\n\t\t}\n\t\tfor _, volumeStatus := range vmi.Status.VolumeStatus {\n\t\t\tif volumeStatus.HotplugVolume == nil {\n\t\t\t\tcontinue\n\t\t\t}\n\t\t\tvar path *safepath.Path\n\t\t\tvar err error\n\t\t\tif m.isBlockVolume(&vmi.Status, volumeStatus.Name) {\n\t\t\t\tpath, err = safepath.JoinNoFollow(basePath, volumeStatus.Name)\n\t\t\t\tif errors.Is(err, os.ErrNotExist) {\n\t\t\t\t\t// already unmounted or never mounted\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t} else if m.isDirectoryMounted(&vmi.Status, volumeStatus.Name) {\n\t\t\t\tpath, err = m.hotplugDiskManager.GetFileSystemDirectoryTargetPathFromHostView(virtlauncherUID, volumeStatus.Name, false)\n\t\t\t\tif errors.Is(err, os.ErrNotExist) {\n\t\t\t\t\t// already unmounted or never mounted\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tpath, err = m.hotplugDiskManager.GetFileSystemDiskTargetPathFromHostView(virtlauncherUID, volumeStatus.Name, false)\n\t\t\t\tif errors.Is(err, os.ErrNotExist) {\n\t\t\t\t\t// already unmounted or never mounted\n\t\t\t\t\tcontinue\n\t\t\t\t}\n\t\t\t}\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tcurrentHotplugPaths[unsafepath.UnsafeAbsolute(path.Raw())] = virtlauncherUID\n\t\t}\n\t\tnewRecord := vmiMountTargetRecord{\n\t\t\tMountTargetEntries: make([]vmiMountTargetEntry, 0),\n\t\t}\n\t\tfor _, entry := range record.MountTargetEntries {\n\t\t\tfd, err := safepath.NewFileNoFollow(entry.TargetFile)\n\t\t\tif err != nil {\n\t\t\t\treturn err\n\t\t\t}\n\t\t\tfd.Close()\n\t\t\tdiskPath := fd.Path()\n\n\t\t\tif _, ok := currentHotplugPaths[unsafepath.UnsafeAbsolute(diskPath.Raw())]; !ok {\n\t\t\t\tif blockDevice, err := isBlockDevice(diskPath); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t} else if blockDevice {\n\t\t\t\t\tif err := m.unmountBlockHotplugVolumes(diskPath, vmi); err != nil {\n\t\t\t\t\t\treturn err\n\t\t\t\t\t}\n\t\t\t\t} else if err := m.unmountFileSystemHotplugVolumes(diskPath); err != nil {\n\t\t\t\t\treturn err\n\t\t\t\t}\n\t\t\t} else {\n\t\t\t\tnewRecord.MountTargetEntries = append(newRecord.MountTargetEntries, vmiMountTargetEntry{\n\t\t\t\t\tTargetFile: unsafepath.UnsafeAbsolute(diskPath.Raw()),\n\t\t\t\t})\n\t\t\t}\n\t\t}\n\t\tif len(newRecord.MountTargetEntries) > 0 {\n\t\t\terr = m.setMountTargetRecord(vmi, &newRecord)\n\t\t} else {\n\t\t\terr = m.deleteMountTargetRecord(vmi)\n\t\t}\n\t\tif err != nil {\n\t\t\treturn err\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "11cbd55269a5e1c25755c94e99beb2fa", "score": "0.48305583", "text": "func (c *Client) DeleteRemotePath(ctx context.Context, path string) error {\n\tvar stderr bytes.Buffer\n\tcmd := []string{\"PATH=''\", \"rm\", path}\n\tif err := c.Run(ctx, cmd, os.Stdout, &stderr); err != nil {\n\t\treturn fmt.Errorf(\"failed to delete %q: %w: %s\", path, err, string(stderr.Bytes()))\n\t}\n\n\treturn nil\n}", "title": "" }, { "docid": "f23db2c8c181206643fa88152d97fe78", "score": "0.48222128", "text": "func (rw *DirectoryReadWrite) Rmdir(path string) error {\n\treturn os.Remove(path)\n}", "title": "" }, { "docid": "3d4a11b691aa8cfdac56418c214edadb", "score": "0.48184448", "text": "func Unmount(target string, flags int) (err error) {\n\tvar _p0 *byte\n\t_p0, err = BytePtrFromString(target)\n\tif err != nil {\n\t\treturn\n\t}\n\t_, _, e1 := sysvicall6(uintptr(unsafe.Pointer(&procumount)), 2, uintptr(unsafe.Pointer(_p0)), uintptr(flags), 0, 0, 0, 0)\n\tif e1 != 0 {\n\t\terr = e1\n\t}\n\treturn\n}", "title": "" }, { "docid": "6ba80430273cdc58434077a0b00e5cca", "score": "0.48133594", "text": "func (o AppImageConfigFileSystemConfigPtrOutput) MountPath() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AppImageConfigFileSystemConfig) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.MountPath\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "6cb633a4de8e39d20fa5a1076a7c3010", "score": "0.4788002", "text": "func (t *TaskDir) unmountSpecialDirs() error {\n\terrs := new(multierror.Error)\n\tdev := filepath.Join(t.Dir, \"dev\")\n\tif pathExists(dev) {\n\t\tif err := unlinkDir(dev); err != nil {\n\t\t\terrs = multierror.Append(errs, fmt.Errorf(\"Failed to unmount dev %q: %v\", dev, err))\n\t\t} else if err := os.RemoveAll(dev); err != nil {\n\t\t\terrs = multierror.Append(errs, fmt.Errorf(\"Failed to delete dev directory %q: %v\", dev, err))\n\t\t}\n\t}\n\n\t// Unmount proc.\n\tproc := filepath.Join(t.Dir, \"proc\")\n\tif pathExists(proc) {\n\t\tif err := unlinkDir(proc); err != nil {\n\t\t\terrs = multierror.Append(errs, fmt.Errorf(\"Failed to unmount proc %q: %v\", proc, err))\n\t\t} else if err := os.RemoveAll(proc); err != nil {\n\t\t\terrs = multierror.Append(errs, fmt.Errorf(\"Failed to delete proc directory %q: %v\", dev, err))\n\t\t}\n\t}\n\n\treturn errs.ErrorOrNil()\n}", "title": "" }, { "docid": "3e72759cc93095290c09b4bd032f808c", "score": "0.47809047", "text": "func UnPath(key string) (namespace, subscription string, err error) {\n\tparts := strings.Split(key, \"/\")\n\tif len(parts) < 5 {\n\t\treturn \"\", \"\", errors.New(\"invalid ring key\")\n\t}\n\treturn parts[3], parts[4], nil\n}", "title": "" }, { "docid": "099b9cb608006f6fc66e58256cb8217b", "score": "0.4768718", "text": "func (container *Container) DetachAndUnmount(volumeEventLog func(name, action string, attributes map[string]string)) error {\n\tctx := context.TODO()\n\n\tnetworkMounts := container.NetworkMounts()\n\tmountPaths := make([]string, 0, len(container.MountPoints)+len(networkMounts))\n\n\tfor _, mntPoint := range container.MountPoints {\n\t\tdest, err := container.GetResourcePath(mntPoint.Destination)\n\t\tif err != nil {\n\t\t\tlog.G(ctx).Warnf(\"Failed to get volume destination path for container '%s' at '%s' while lazily unmounting: %v\", container.ID, mntPoint.Destination, err)\n\t\t\tcontinue\n\t\t}\n\t\tmountPaths = append(mountPaths, dest)\n\t}\n\n\tfor _, m := range networkMounts {\n\t\tdest, err := container.GetResourcePath(m.Destination)\n\t\tif err != nil {\n\t\t\tlog.G(ctx).Warnf(\"Failed to get volume destination path for container '%s' at '%s' while lazily unmounting: %v\", container.ID, m.Destination, err)\n\t\t\tcontinue\n\t\t}\n\t\tmountPaths = append(mountPaths, dest)\n\t}\n\n\tfor _, mountPath := range mountPaths {\n\t\tif err := mount.Unmount(mountPath); err != nil {\n\t\t\tlog.G(ctx).WithError(err).WithField(\"container\", container.ID).\n\t\t\t\tWarn(\"Unable to unmount\")\n\t\t}\n\t}\n\treturn container.UnmountVolumes(volumeEventLog)\n}", "title": "" }, { "docid": "69aa866af50156836e6ee815288893e7", "score": "0.47672877", "text": "func Unmount(device string) error {\n\tout, err := exec.Command(\"umount\", device).Output()\n\tif len(out) > 0 {\n\t\taudit.Println(\"Unmount the device\", device)\n\t\taudit.Println(string(out))\n\t}\n\n\treturn err\n}", "title": "" }, { "docid": "b8f2d7ad0b9a45a35fe9269ea8e9568f", "score": "0.47637478", "text": "func (fs *FileboxFileSystem) Rmdir(path string) int {\n\tlog.Tracef(\"Deleting directory %s\", path)\n\n\tif _, ok := fs.Client.SendReceive(protocol.DeleteDirectoryRequest{path}); !ok {\n\t\tlog.WithField(\"path\", path).Error(\"DeleteDirectory failed\")\n\t\treturn -fuse.EIO\n\t}\n\n\treturn 0\n}", "title": "" }, { "docid": "6b07f5ff9020a4bb6ebfdba95239a726", "score": "0.47606668", "text": "func (device *Device) Dismount() error {\n\tif len(device.partitions) < 1 {\n\t\treturn nil\n\t}\n\tfor _, part := range device.partitions {\n\t\t// Skip partitions with no drive letter.\n\t\tif part.mount == \"\" {\n\t\t\tcontinue\n\t\t}\n\t\t// e.g.: Remove-PartitionAccessPath -Disknumber 1 -PartitionNumber 1 -AccessPath \"D:\\\"\n\t\tpsBlock := fmt.Sprintf(`Remove-PartitionAccessPath -DiskNumber %s -PartitionNumber %s -AccessPath '%s:\\'`, device.id, part.id, part.mount)\n\t\tout, err := powershellCmd(psBlock)\n\t\tif err != nil {\n\t\t\treturn fmt.Errorf(\"%v: %w\", err, errPowershell)\n\t\t}\n\t\tif regExPSRemoveAccessPathErr.Match(out) {\n\t\t\treturn fmt.Errorf(\"%v: %w\", out, errDisk)\n\t\t}\n\t\t// Clear the drive letter from the partition\n\t\tpart.mount = \"\"\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "f5fc0bc008bf3fa007c061fa394e33a5", "score": "0.4748603", "text": "func (*EppDevice) DeletePath(ref string) string {\n\treturn fmt.Sprintf(\"/api/objects/epp/device/%s\", ref)\n}", "title": "" }, { "docid": "f7332abb1d097a709d704be89185d250", "score": "0.47326392", "text": "func (d *gceDriver) Unmount(id string) error {\n\tvol, err := d.getVolume(id)\n\tif err != nil {\n\t\treturn err\n\t}\n\n\tif vol.Path == \"\" {\n\t\treturn fmt.Errorf(\"GCE: volume '%s' not mounted\", id)\n\t}\n\n\t// unmount\n\tif err = d.unmountDisk(vol); err != nil {\n\t\treturn err\n\t}\n\n\t// detach\n\tif err = d.detachDisk(vol); err != nil {\n\t\treturn err\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "300d65e4a370d7ce3acadfaaa22c0070", "score": "0.47170708", "text": "func (receiver *SHA1) Unmount() error {\n\tif nil == receiver {\n\t\treturn nil\n\t}\n\n\treceiver.mutex.Lock()\n\tdefer receiver.mutex.Unlock()\n\n\treceiver.data = nil\n\n\treturn nil\n}", "title": "" }, { "docid": "6dfd97e583c51defc084b27ef74dcf5f", "score": "0.47100988", "text": "func UnmountDMG(dmgpath string, opts ...Option) (result bool, err error) {\n\to := new(hdiutil)\n\to.ctx = context.Background()\n\tif err := o.apply(opts...); err != nil {\n\t\treturn false, err\n\t}\n\n\tif _, ok := o.ctx.Deadline(); !ok {\n\t\tvar cancel func()\n\t\to.ctx, cancel = context.WithTimeout(o.ctx, 10*time.Minute)\n\t\tdefer cancel()\n\t}\n\n\tcmd := unmountcmd(o.ctx, dmgpath, o.args...)\n\tif _, err := cmd.Output(); err != nil {\n\t\t// ordinary unmount unsuccessful, try forcing\n\t\tcmd := unmountcmd(o.ctx, dmgpath, \"-force\")\n\t\t_, err := cmd.Output()\n\t\tif err != nil {\n\t\t\treturn false, err\n\t\t}\n\t}\n\n\treturn true, nil\n}", "title": "" }, { "docid": "db1ba10a8f02488976b89aecbfc983f4", "score": "0.47069263", "text": "func (r *webGLRenderer) Unmount() {\n\tif r.opts.Shutdown != nil {\n\t\tr.opts.Shutdown(r.renderer)\n\t}\n}", "title": "" }, { "docid": "bb7b556e92238295899517e212258410", "score": "0.46989617", "text": "func CleanPath(path string) string {\n\tpath = strings.TrimPrefix(path, \"/\")\n\tpath = strings.TrimSuffix(path, \"/\")\n\treturn path\n}", "title": "" }, { "docid": "c04818ff5045027b090fda6b165df4c5", "score": "0.46964818", "text": "func CleanAndExpandPath(path, datadir string) string {\n\t// Expand initial ~ to OS specific home directory.\n\thomeDir := filepath.Dir(AppDataDir(\"9\", false))\n\tif strings.HasPrefix(path, \"~\") {\n\t\treturn strings.Replace(path, \"~\", homeDir, 1)\n\t}\n\tif strings.HasPrefix(path, \"./\") {\n\t\t// explicitly prefix is this must be a relative path\n\t\tpwd, _ := os.Getwd()\n\t\treturn filepath.Join(pwd, path)\n\t} else if !strings.HasPrefix(path, \"/\") && !strings.HasPrefix(path, \"\\\\\") {\n\t\tif path != datadir {\n\t\t\treturn filepath.Join(datadir, path)\n\t\t}\n\t}\n\t// NOTE: The os.ExpandEnv doesn't work with Windows-style %VARIABLE%, but they variables can still be expanded via POSIX-style $VARIABLE.\n\tpath = filepath.Clean(os.ExpandEnv(path))\n\treturn path\n}", "title": "" }, { "docid": "95c2058f39618a5c47840f40ec895cfd", "score": "0.46774358", "text": "func (fse *fsevents) Unwatch(path string) error {\n\treturn fse.unwatch(path)\n}", "title": "" }, { "docid": "254bcd57f81d957d59522c08184fe387", "score": "0.46617064", "text": "func (container *Container) UnmountSecrets() error {\n\tp, err := container.SecretMountPath()\n\tif err != nil {\n\t\treturn err\n\t}\n\tif _, err := os.Stat(p); err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn nil\n\t\t}\n\t\treturn err\n\t}\n\n\treturn mount.RecursiveUnmount(p)\n}", "title": "" }, { "docid": "468b9604f301392c1a40cb33d2933fa9", "score": "0.4660904", "text": "func (d *mock) Unmount() (bool, error) {\n\treturn true, nil\n}", "title": "" }, { "docid": "9bf3b7f4a1c2038a82f56c89bbd89950", "score": "0.4650804", "text": "func CleanPath(path string) string {\n\t// Deal with empty strings nicely.\n\tif path == \"\" {\n\t\treturn \"\"\n\t}\n\n\t// Ensure that all paths are cleaned (especially problematic ones like\n\t// \"/../../../../../\" which can cause lots of issues).\n\tpath = filepath.Clean(path)\n\n\t// If the path isn't absolute, we need to do more processing to fix paths\n\t// such as \"../../../../<etc>/some/path\". We also shouldn't convert absolute\n\t// paths to relative ones.\n\tif !filepath.IsAbs(path) {\n\t\tpath = filepath.Clean(string(os.PathSeparator) + path)\n\t\t// This can't fail, as (by definition) all paths are relative to root.\n\t\tpath, _ = filepath.Rel(string(os.PathSeparator), path)\n\t}\n\n\t// Clean the path again for good measure.\n\treturn filepath.Clean(path)\n}", "title": "" }, { "docid": "b836faa310ead9250b99cefb589cd282", "score": "0.4643853", "text": "func (a *LocRIB) RemovePath(pfx *net.Prefix, p *route.Path) bool {\n\ta.mu.Lock()\n\tdefer a.mu.Unlock()\n\n\tlog.WithFields(map[string]interface{}{\n\t\t\"Prefix\": pfx,\n\t\t\"Route\": p,\n\t}).Debug(\"Remove from locRIB\")\n\tvar oldRoute *route.Route\n\tr := a.rt.Get(pfx)\n\tif r != nil {\n\t\toldRoute = r.Copy()\n\t} else {\n\t\treturn true\n\t}\n\n\ta.rt.RemovePath(pfx, p)\n\tr.PathSelection()\n\n\tr = a.rt.Get(pfx)\n\tnewRoute := r.Copy()\n\n\ta.propagateChanges(oldRoute, newRoute)\n\treturn true\n}", "title": "" }, { "docid": "34e7f1e29ca734586c6cee753cefd677", "score": "0.4641039", "text": "func (u *RecordHead) rmPath() string {\n\tif u.Idstr() == \"\" || u.Datfile == \"\" {\n\t\treturn \"\"\n\t}\n\treturn filepath.Join(u.CacheDir, u.dathash(), \"removed\", u.Idstr())\n}", "title": "" }, { "docid": "f63167bc37706747096bc21ecc010a80", "score": "0.46364152", "text": "func unmountErr(dir string) error {\n\tvar cmd *exec.Cmd\n\tif runtime.GOOS == \"linux\" {\n\t\tcmd = exec.Command(\"fusermount\", \"-u\", dir)\n\t} else if runtime.GOOS == \"darwin\" {\n\t\tcmd = exec.Command(\"umount\", dir)\n\t}\n\n\tcmd.Stdout = os.Stdout\n\tcmd.Stderr = os.Stderr\n\treturn cmd.Run()\n}", "title": "" } ]
a75b719de5230e145a54f235e276ec9f
GetForecastTenDay returns the ForecastTenDay
[ { "docid": "d64a6417f2ca10660bd333b8a1f1ee25", "score": "0.8395998", "text": "func (w *Wug) GetForecastTenDay(query *Query) (*ForecastTenDay, error) {\n\tdata, err := w.GetRawForecastTenDay(query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tforecast := &ForecastTenDay{}\n\terr = json.Unmarshal(data, forecast)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn forecast, nil\n}", "title": "" } ]
[ { "docid": "28a833dfea0b1ea4ac13d3646a8655e5", "score": "0.74425346", "text": "func (w *Wug) GetRawForecastTenDay(query *Query) ([]byte, error) {\n\treturn w.Get(ForeTenDay, query)\n}", "title": "" }, { "docid": "365ad22538cf21eecf2e61095d70e474", "score": "0.61820894", "text": "func (w *Wug) GetHourlyTenDay(query *Query) (*HourlyTenDay, error) {\n\tdata, err := w.GetRawHourlyTenDay(query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\thourly := &HourlyTenDay{}\n\terr = json.Unmarshal(data, hourly)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn hourly, nil\n}", "title": "" }, { "docid": "9439d7eb8f779318063d9ed949d7c404", "score": "0.60473126", "text": "func Forecast(apiKey, city string) (openweather.DailyForecast5, error) {\n\tresult, err := openweather.NewQueryForCity(apiKey, city).DailyForecast5()\n\treturn *result, err\n}", "title": "" }, { "docid": "9e3baec4ad7c3f8889efbf674f6bd3fe", "score": "0.57889515", "text": "func (w *Wug) GetForecast(query *Query) (*Forecast, error) {\n\tdata, err := w.GetRawForecast(query)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tforecast := &Forecast{}\n\terr = json.Unmarshal(data, forecast)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\treturn forecast, nil\n}", "title": "" }, { "docid": "51d447325327ffc0c30285f9d6690d31", "score": "0.5707907", "text": "func (a *InsightsApiService) GetSalesForecast(ctx _context.Context, offerId string, weeksAhead int32) (SalesForecastResponse, *_nethttp.Response, error) {\n\tvar (\n\t\tlocalVarHTTPMethod = _nethttp.MethodGet\n\t\tlocalVarPostBody interface{}\n\t\tlocalVarFormFileName string\n\t\tlocalVarFileName string\n\t\tlocalVarFileBytes []byte\n\t\tlocalVarReturnValue SalesForecastResponse\n\t)\n\n\t// create path and map variables\n\tlocalVarPath := a.client.cfg.BasePath + \"/retailer/insights/sales-forecast\"\n\tlocalVarHeaderParams := make(map[string]string)\n\tlocalVarQueryParams := _neturl.Values{}\n\tlocalVarFormParams := _neturl.Values{}\n\n\tlocalVarQueryParams.Add(\"offer-id\", parameterToString(offerId, \"\"))\n\tlocalVarQueryParams.Add(\"weeks-ahead\", parameterToString(weeksAhead, \"\"))\n\t// to determine the Content-Type header\n\tlocalVarHTTPContentTypes := []string{}\n\n\t// set Content-Type header\n\tlocalVarHTTPContentType := selectHeaderContentType(localVarHTTPContentTypes)\n\tif localVarHTTPContentType != \"\" {\n\t\tlocalVarHeaderParams[\"Content-Type\"] = localVarHTTPContentType\n\t}\n\n\t// to determine the Accept header\n\tlocalVarHTTPHeaderAccepts := []string{\"application/vnd.retailer.v4+json\", \"application/vnd.retailer.v4+xml\"}\n\n\t// set Accept header\n\tlocalVarHTTPHeaderAccept := selectHeaderAccept(localVarHTTPHeaderAccepts)\n\tif localVarHTTPHeaderAccept != \"\" {\n\t\tlocalVarHeaderParams[\"Accept\"] = localVarHTTPHeaderAccept\n\t}\n\tr, err := a.client.prepareRequest(ctx, localVarPath, localVarHTTPMethod, localVarPostBody, localVarHeaderParams, localVarQueryParams, localVarFormParams, localVarFormFileName, localVarFileName, localVarFileBytes)\n\tif err != nil {\n\t\treturn localVarReturnValue, nil, err\n\t}\n\n\tlocalVarHTTPResponse, err := a.client.callAPI(r)\n\tif err != nil || localVarHTTPResponse == nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tlocalVarBody, err := _ioutil.ReadAll(localVarHTTPResponse.Body)\n\tlocalVarHTTPResponse.Body.Close()\n\tlocalVarHTTPResponse.Body = _ioutil.NopCloser(_bytes.NewBuffer(localVarBody))\n\tif err != nil {\n\t\treturn localVarReturnValue, localVarHTTPResponse, err\n\t}\n\n\tif localVarHTTPResponse.StatusCode >= 300 {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: localVarHTTPResponse.Status,\n\t\t}\n\t\tif localVarHTTPResponse.StatusCode == 400 {\n\t\t\tvar v Problem\n\t\t\terr = a.client.decode(&v, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\t\t\tif err != nil {\n\t\t\t\tnewErr.error = err.Error()\n\t\t\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t\t\t}\n\t\t\tnewErr.model = v\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\terr = a.client.decode(&localVarReturnValue, localVarBody, localVarHTTPResponse.Header.Get(\"Content-Type\"))\n\tif err != nil {\n\t\tnewErr := GenericOpenAPIError{\n\t\t\tbody: localVarBody,\n\t\t\terror: err.Error(),\n\t\t}\n\t\treturn localVarReturnValue, localVarHTTPResponse, newErr\n\t}\n\n\treturn localVarReturnValue, localVarHTTPResponse, nil\n}", "title": "" }, { "docid": "791f87bb3e90c2b3cda2a29de3a68172", "score": "0.55154616", "text": "func Forecast(city, station string, timestamp int64) ObForecast {\n\tvar url = fmt.Sprintf(\"http://openbikes.co/api/prediction/%s/%s/%d\", city, station, timestamp)\n\tvar res, err = http.Get(url)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\tdefer res.Body.Close()\n\tvar forecast ObForecast\n\t// Read bytes\n\tdata, err := ioutil.ReadAll(res.Body)\n\t// Unmarshal\n\tif err == nil && data != nil {\n\t\terr = json.Unmarshal(data, &forecast)\n\t}\n\treturn forecast\n}", "title": "" }, { "docid": "695f4fc00640512cb7f97435e503a105", "score": "0.5400538", "text": "func (c *Client) SemidailyForecast() Forecast {\n\treturn c.semidailyForecast\n}", "title": "" }, { "docid": "0d36eb2427903b344fbb6b617925d131", "score": "0.5382874", "text": "func (c *Client) HourlyForecast() Forecast {\n\treturn c.hourlyForecast\n}", "title": "" }, { "docid": "5b6a43f355af9b1d6e42f13d3f884e5f", "score": "0.5382333", "text": "func (w *Wug) GetRawHourlyTenDay(query *Query) ([]byte, error) {\n\treturn w.Get(HourTenDay, query)\n}", "title": "" }, { "docid": "1dbca9123aa2e82b61cc560c228c671f", "score": "0.5361226", "text": "func (cli *weatherStackCli) GetForecastData(country, state, city string, forecastDays uint, httpCli httpClient) (map[string]interface{}, error) {\n\tURL := fmt.Sprintf(\"%v/forecast\", wsURL)\n\trequest := map[string]interface{}{\n\t\t\"verb\": http.MethodGet,\n\t\t\"url\": URL,\n\t\t\"queryParams\": map[string]string{\n\t\t\t\"access_key\": wsAccessKey,\n\t\t\t\"query\": fmt.Sprintf(\"%v,%v,%v\", country, state, city),\n\t\t\t\"forecast_days\": fmt.Sprintf(\"%v\", forecastDays),\n\t\t\t\"units\": \"m\",\n\t\t},\n\t}\n\n\tlogrus.Infof(\"sending request to %v\", URL)\n\tresponse, err := httpCli.PerformRequest(request)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\tdefer response.Body.Close()\n\n\tif response.StatusCode != 200 {\n\t\treturn nil, di.CustomError{\n\t\t\tCause: di.ErrDependencyNotAvailable,\n\t\t\tMessage: fmt.Sprintf(\"weather provider responded with an invalid status code: %d\", response.StatusCode),\n\t\t}\n\t}\n\n\tbody, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar bodyMap map[string]interface{}\n\n\tif err := json.Unmarshal(body, &bodyMap); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn bodyMap, nil\n}", "title": "" }, { "docid": "2687b83ca16d446596e26c33c8ede426", "score": "0.5192737", "text": "func (c *Client) GetDailyForecasts(locationKey string, forecastType DailyForecastType) (*DailyForecast, error) {\n\treq := c.newAccuRequest()\n\tvar result DailyForecast\n\terr := c.getJSON(\"/forecasts/v1/daily/\"+forecastType.String()+\"/\"+locationKey, req, &result)\n\treturn &result, err\n}", "title": "" }, { "docid": "5bfea76b5796d3e1066640a2cb824735", "score": "0.50838053", "text": "func toForecastResponse(domainFC *domain.Forecast) *models.Forecast {\n\tmodel := &models.Forecast{\n\t\tTemperature: formatTemp(domainFC.Temperature),\n\t\tWind: formatWind(domainFC.WindSpeed, domainFC.WindDegree),\n\t\tPressure: formatPressure(domainFC.Pressure),\n\t\tHumidity: formatHumidity(domainFC.Humidity),\n\t\tSunrise: formatSunriseOrSunset(domainFC.Sunrise),\n\t\tSunset: formatSunriseOrSunset(domainFC.Sunset),\n\t\tDate: time.Unix(int64(domainFC.DateTime), 0).Format(\"2006-02-01 15:04:05\"),\n\t}\n\treturn model\n}", "title": "" }, { "docid": "002521003794021bb5c654c7ca733fcd", "score": "0.5072287", "text": "func (w *WundergroundConditionsGetter) ParseForecast(resp []byte, daysFromNow int) (icon string, tempF float64, precipIn float64, err error) {\n\tvar jt map[string]interface{}\n\tif err := json.Unmarshal(resp, &jt); err != nil {\n\t\treturn \"\", 0.0, 0.0, err\n\t}\n\n\tdstr := fmt.Sprint(daysFromNow)\n\tici, err := GetPath(jt, \"forecast/simpleforecast/forecastday/\"+dstr+\"/icon\")\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"%v: \\n\\n%s\", err, string(resp))\n\t}\n\n\tti, err := GetPath(jt, \"forecast/simpleforecast/forecastday/\"+dstr+\"/high/fahrenheit\")\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"%v: \\n\\n%s\", err, string(resp))\n\t}\n\n\tpi, err := GetPath(jt, \"forecast/simpleforecast/forecastday/\"+dstr+\"/qpf_allday/in\")\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"%v: \\n\\n%s\", err, string(resp))\n\t}\n\n\ticon = ici.(string)\n\n\ttempF, err = strIfToFloat32(ti)\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"tempF: %s\", err)\n\t}\n\n\tif _, ok := pi.(float64); !ok {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"precipIn value has type %T, expect float64\", pi)\n\t}\n\tprecipIn = float64(pi.(float64))\n\n\treturn\n}", "title": "" }, { "docid": "b93d9264021612ef2cca6af586101a27", "score": "0.5026621", "text": "func forecast(fCast []Res) ([]byte, []byte, []byte) {\n\n\tvar tDay string\n\tloc, _ := time.LoadLocation(\"UTC\")\n\tlayout := \"2006-01-02T15:04:05\"\n\n\tnow := time.Now().In(loc).Truncate(24 * time.Hour)\n\n\tfor _, t := range fCast {\n\t\t// attempt to parse utc to time\n\t\ttt, err := time.Parse(layout, t.Utc)\n\t\tcheck(err)\n\t\tdiff := now.Sub(tt.Truncate(24 * time.Hour))\n\n\t\txTemp, err := strconv.ParseInt(t.Temp, 10, 10)\n\t\tcheck(err)\n\t\txRChance, err := strconv.ParseInt(t.Chance, 10, 10)\n\t\tcheck(err)\n\t\txRTotal, err := strconv.ParseFloat(t.Rain, 10)\n\t\tcheck(err)\n\t\txWind, err := strconv.ParseInt(t.Wind, 10, 10)\n\t\tcheck(err)\n\t\txGust, err := strconv.ParseInt(t.Wind, 10, 10)\n\t\tcheck(err)\n\t\txHumid, err := strconv.ParseInt(t.Humid, 10, 10)\n\t\tcheck(err)\n\n\t\tswitch {\n\t\tcase diff.Hours() == 0: // today\n\n\t\t\ttDay = \"today\"\n\t\t\td1.Day = tDay\n\t\t\td1.RainChance = append(d1.RainChance, xRChance)\n\t\t\td1.RainTotal = d1.RainTotal + xRTotal\n\t\t\td1.Wind = append(d1.Wind, xWind)\n\t\t\td1.Gust = append(d1.Gust, xGust)\n\t\t\td1.Temp = append(d1.Temp, xTemp)\n\t\t\td1.Humid = append(d1.Humid, xHumid)\n\n\t\tcase diff.Hours() == -24: // tomorrow\n\n\t\t\ttDay = \"tomorrow\"\n\t\t\td2.Day = tDay\n\t\t\td2.RainChance = append(d2.RainChance, xRChance)\n\t\t\td2.RainTotal = d2.RainTotal + xRTotal\n\t\t\td2.Wind = append(d2.Wind, xWind)\n\t\t\td2.Gust = append(d2.Gust, xGust)\n\t\t\td2.Temp = append(d2.Temp, xTemp)\n\t\t\td2.Humid = append(d2.Humid, xHumid)\n\n\t\tcase diff.Hours() == -48: // day after\n\n\t\t\ttDay = t.DayN\n\t\t\td3.Day = tDay\n\t\t\td3.RainChance = append(d3.RainChance, xRChance)\n\t\t\td3.RainTotal = d3.RainTotal + xRTotal\n\t\t\td3.Wind = append(d3.Wind, xWind)\n\t\t\td3.Gust = append(d3.Gust, xGust)\n\t\t\td3.Temp = append(d3.Temp, xTemp)\n\t\t\td3.Humid = append(d3.Humid, xHumid)\n\n\t\tdefault:\n\t\t\t// do nothing\n\t\t}\n\n\t}\n\n\tb1 = format(d1)\n\tb2 = format(d2)\n\tb3 = format(d3)\n\n\treturn b1, b2, b3\n}", "title": "" }, { "docid": "ae0b5dc2b7f438737f23d4122150ddc0", "score": "0.5020453", "text": "func (w *Wug) GetRawForecast(query *Query) ([]byte, error) {\n\treturn w.Get(Fore, query)\n}", "title": "" }, { "docid": "206510048900adfa517c3a3bf57163b9", "score": "0.50047976", "text": "func (c *Client) HourlyForecast(args ForecastArgs) ([]Weather, error) {\n\t// set up a request to the hourly forecast endpoint\n\tendpt := baseURL.ResolveReference(\n\t\t&url.URL{Path: \"weather/forecast/hourly\"})\n\treq, err := http.NewRequest(\"GET\", endpt.String(), nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// add URL headers, query params, then send the request\n\treq.Header.Add(\"Accept\", \"application/json\")\n\treq.Header.Add(\"apikey\", c.apiKey)\n\treq.URL.RawQuery = args.QueryParams().Encode()\n\n\tres, err := c.c.Do(req)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\t// deserialize the response and return our weather data\n\tdefer res.Body.Close()\n\n\tswitch res.StatusCode {\n\tcase 200:\n\t\tvar weatherSamples []Weather\n\t\tif err := json.NewDecoder(res.Body).Decode(&weatherSamples); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\t\treturn weatherSamples, nil\n\tcase 400, 401, 403, 500:\n\t\tvar errRes ErrorResponse\n\t\tif err := json.NewDecoder(res.Body).Decode(&errRes); err != nil {\n\t\t\treturn nil, err\n\t\t}\n\n\t\tif errRes.StatusCode == 0 {\n\t\t\terrRes.StatusCode = res.StatusCode\n\t\t}\n\t\treturn nil, &errRes\n\tdefault:\n\t\t// handle unexpected status codes\n\t\treturn nil, fmt.Errorf(\"unexpected status code %d\", res.StatusCode)\n\t}\n}", "title": "" }, { "docid": "0183387d86862929dbfe571d45de86d0", "score": "0.49167007", "text": "func forecast(fCast []Res) (Final, Final, Final) {\n\n\tvar tDay string\n\tvar d1, d2, d3 Final\n\tloc, _ := time.LoadLocation(\"UTC\")\n\tlayout := \"2006-01-02T15:04:05\"\n\tnow := time.Now().In(loc).Truncate(24 * time.Hour)\n\n\tfor _, t := range fCast {\n\t\t// attempt to parse utc to time\n\t\ttt, err := time.Parse(layout, t.Utc)\n\t\tcheck(err)\n\t\tdiff := now.Sub(tt.Truncate(24 * time.Hour))\n\n\t\txTemp, err := strconv.ParseInt(t.Temp, 10, 10)\n\t\tcheck(err)\n\t\txRChance, err := strconv.ParseInt(t.Chance, 10, 10)\n\t\tcheck(err)\n\t\txRTotal, err := strconv.ParseFloat(t.Rain, 10)\n\t\tcheck(err)\n\t\txWind, err := strconv.ParseInt(t.Wind, 10, 10)\n\t\tcheck(err)\n\t\txGust, err := strconv.ParseInt(t.Wind, 10, 10)\n\t\tcheck(err)\n\t\txHumid, err := strconv.ParseInt(t.Humid, 10, 10)\n\t\tcheck(err)\n\n\t\tswitch {\n\t\tcase diff.Hours() == 0: // today\n\n\t\t\ttDay = \"today\"\n\t\t\td1.Day = tDay\n\t\t\td1.RainChance = append(d1.RainChance, xRChance)\n\t\t\td1.RainTotal = d1.RainTotal + xRTotal\n\t\t\td1.Wind = append(d1.Wind, xWind)\n\t\t\td1.Gust = append(d1.Gust, xGust)\n\t\t\td1.Temp = append(d1.Temp, xTemp)\n\t\t\td1.Humid = append(d1.Humid, xHumid)\n\n\t\tcase diff.Hours() == -24: // tomorrow\n\n\t\t\ttDay = \"tomorrow\"\n\t\t\td2.Day = tDay\n\t\t\td2.RainChance = append(d2.RainChance, xRChance)\n\t\t\td2.RainTotal = d2.RainTotal + xRTotal\n\t\t\td2.Wind = append(d2.Wind, xWind)\n\t\t\td2.Gust = append(d2.Gust, xGust)\n\t\t\td2.Temp = append(d2.Temp, xTemp)\n\t\t\td2.Humid = append(d2.Humid, xHumid)\n\n\t\tcase diff.Hours() == -48: //day after\n\n\t\t\ttDay = t.DayN\n\t\t\td3.Day = tDay\n\t\t\td3.RainChance = append(d3.RainChance, xRChance)\n\t\t\td3.RainTotal = d3.RainTotal + xRTotal\n\t\t\td3.Wind = append(d3.Wind, xWind)\n\t\t\td3.Gust = append(d3.Gust, xGust)\n\t\t\td3.Temp = append(d3.Temp, xTemp)\n\t\t\td3.Humid = append(d3.Humid, xHumid)\n\n\t\tdefault:\n\t\t\t// do nothing\n\t\t}\n\n\t}\n\n\tr1 := Format(d1)\n\tr2 := Format(d2)\n\tr3 := Format(d3)\n\treturn r1, r2, r3\n\n}", "title": "" }, { "docid": "1297a3765a67866f2c1a0edff1296e41", "score": "0.48619196", "text": "func weatherForecast(w http.ResponseWriter, r *http.Request) {\n\t// environment variable\n\t// TODO: create tests for input values\n\tapiKey := os.Getenv(\"API_KEY\")\n\toutputFormat := strings.ToLower(os.Getenv(\"OUTPUT_FORMAT\"))\n\tmyCity := strings.ToLower(os.Getenv(\"MY_CITY\"))\n\n\tlogrus.Info(\"Find out the Weather Forecast\")\n\n\turl := fmt.Sprintf(\"http://api.openweathermap.org/data/2.5/weather?q=%s&mode=%s&appid=%s\", myCity, outputFormat, apiKey)\n\tresp, err := http.Get(url)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\tdefer resp.Body.Close()\n\n\tbody, err := ioutil.ReadAll(resp.Body)\n\n\tif err != nil {\n\t\tlog.Fatal(err)\n\t}\n\n\t// return http code 200\n\tw.WriteHeader(http.StatusOK)\n\n\t// output\n\tfmt.Fprint(w, string(body))\n}", "title": "" }, { "docid": "99b92d1ae6e8619342c1028df2190ae8", "score": "0.47837332", "text": "func (dt *DateTime) GetDay() *Number {\n\treturn dt.Day()\n}", "title": "" }, { "docid": "9c6e5b61bd55972a51b65cd66ed41aa0", "score": "0.4709178", "text": "func (o TransferJobScheduleScheduleEndDateOutput) Day() pulumi.IntOutput {\n\treturn o.ApplyT(func(v TransferJobScheduleScheduleEndDate) int { return v.Day }).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "3c6e488df48ed1594069ff6e40d0f317", "score": "0.47089264", "text": "func NewForecastFunc(tp elastictransport.Interface) NewForecast {\n\treturn func(jobid string) *Forecast {\n\t\tn := New(tp)\n\n\t\tn.JobId(jobid)\n\n\t\treturn n\n\t}\n}", "title": "" }, { "docid": "6bba0d78a7b9991d29704211ab27e373", "score": "0.46439072", "text": "func GetTNthWorkingDay(date time.Time, Nth int32) (time.Time, error) {\n\tif Nth <= 0 {\n\t\treturn date, errors.New(\"not support such Nth\")\n\t}\n\t// 寻找第一个工作日,避免在节假日开始计算,倒数日不准确\n\tisHoliday := b.isHoliday(date)\n\ttmpAdd, tmpDate := int(0), date\n\tif isHoliday {\n\t\tfor {\n\t\t\tif tmpAdd > MAXCOUNT {\n\t\t\t\treturn date, errors.New(\"over the MAXCOUNT\")\n\t\t\t}\n\t\t\t// 寻找第一个工作日\n\t\t\ttmpAdd++\n\t\t\tcurDate := tmpDate.AddDate(0, 0, tmpAdd)\n\t\t\tisWork := b.isWorkingday(curDate)\n\t\t\tif isWork {\n\t\t\t\t// 获取当日凌晨\n\t\t\t\tdate = tool.GetBeforeDawnOfDate(curDate)\n\t\t\t\tbreak\n\t\t\t}\n\t\t}\n\t}\n\t// Countdown days、the number of days to be added counter(倒计时天数、需新增的天数计数器)\n\tcountNth, needAddNth := int(0), int(0)\n\tfor {\n\t\tif needAddNth > MAXCOUNT {\n\t\t\treturn date, errors.New(\"over the MAXCOUNT\")\n\t\t}\n\t\tif int32(countNth) == Nth {\n\t\t\tbreak\n\t\t}\n\t\tneedAddNth++\n\t\tisWorkday := b.isWorkingday(date.AddDate(0, 0, needAddNth))\n\t\tif isWorkday {\n\t\t\tcountNth++\n\t\t}\n\t}\n\treturn date.AddDate(0, 0, needAddNth), nil\n}", "title": "" }, { "docid": "fe5a40445f1d6d20eb1bee57354040af", "score": "0.46411443", "text": "func (o TransferJobScheduleScheduleStartDateOutput) Day() pulumi.IntOutput {\n\treturn o.ApplyT(func(v TransferJobScheduleScheduleStartDate) int { return v.Day }).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "ba211f5cf6d437bbd573957c40e592bf", "score": "0.4557017", "text": "func Forecast(city, condition string) string {\n\tCurrentLocation, CurrentCondition = city, condition\n\treturn CurrentLocation + \" - current weather condition: \" + CurrentCondition\n}", "title": "" }, { "docid": "ba211f5cf6d437bbd573957c40e592bf", "score": "0.4557017", "text": "func Forecast(city, condition string) string {\n\tCurrentLocation, CurrentCondition = city, condition\n\treturn CurrentLocation + \" - current weather condition: \" + CurrentCondition\n}", "title": "" }, { "docid": "ba211f5cf6d437bbd573957c40e592bf", "score": "0.4557017", "text": "func Forecast(city, condition string) string {\n\tCurrentLocation, CurrentCondition = city, condition\n\treturn CurrentLocation + \" - current weather condition: \" + CurrentCondition\n}", "title": "" }, { "docid": "ba211f5cf6d437bbd573957c40e592bf", "score": "0.4557017", "text": "func Forecast(city, condition string) string {\n\tCurrentLocation, CurrentCondition = city, condition\n\treturn CurrentLocation + \" - current weather condition: \" + CurrentCondition\n}", "title": "" }, { "docid": "9609034ae8114674c37e7823cc2814a1", "score": "0.45195657", "text": "func NewGetForecastByZIPCodeDefault(code int) *GetForecastByZIPCodeDefault {\n\treturn &GetForecastByZIPCodeDefault{\n\t\t_statusCode: code,\n\t}\n}", "title": "" }, { "docid": "3770dec1abf144cb6bb14f7bfa8a47ee", "score": "0.44840348", "text": "func drawForecast() {\n\t// Fetch the current day forecast\n\turl := \"https://api.darksky.net/forecast/071445d23ee7a1ed7b1392b2aec2726f/39.4022,-107.2112\"\n\tresponse, err := http.Get(url)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\t// Let Go close this resource when we are through with it\n\tdefer response.Body.Close()\n\n\t// Read the whole response\n\tbody, err := ioutil.ReadAll(response.Body)\n\tif err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Parse the json into something we can use\n\tinfo := map[string]interface{}{}\n\tif err := json.Unmarshal(body, &info); err != nil {\n\t\tpanic(err)\n\t}\n\n\t// Extract the information we want to use\n\t// The var.(string) is a type assertion - it says we know the variable is not\n\t// nil and is the paren'd type. We can string those together... Using the example\n\t// response as a guide.\n\tcurrently := info[\"currently\"].(map[string]interface{})\n\tsummary := currently[\"summary\"].(string)\n\ttemp := currently[\"temperature\"].(float64)\n\tfeelsLike := currently[\"apparentTemperature\"].(float64)\n\n\ttempStr := fmt.Sprintf(\"%d°\", int(temp))\n\tfeelsLikeStr := fmt.Sprintf(\"(feels like %d°)\", int(feelsLike))\n\n\tsummaryIcon := info[\"currently\"].(map[string]interface{})[\"icon\"].(string)\n\tsummaryIconUrl := fmt.Sprintf(\"https://darksky.net/images/weather-icons/%s.png\", summaryIcon)\n\n\thourly := info[\"hourly\"].(map[string]interface{})\n\thourlySummary := hourly[\"summary\"].(string)\n\n\ty := yMargin\n\ttext(xMargin, y, txtSizeMd, txtAlignLeft, summary)\n\ty += 70\n\ttext(xMargin, y, txtSizeLg, txtAlignLeft, tempStr)\n\n\t// Add a link to the summary icon\n\tcanvas.Link(summaryIconUrl, summary)\n\tcanvas.Image(xMargin+80, 100, 100, 100, summaryIconUrl)\n\tcanvas.LinkEnd()\n\n\ty += 40\n\ttext(xMargin, y, txtSizeSm, txtAlignLeft, feelsLikeStr)\n\ty += 20\n\ttext(xMargin, y, txtSizeExSm, txtAlignLeft, hourlySummary)\n}", "title": "" }, { "docid": "14f9fc443b6014c47531e93ed00ab657", "score": "0.4468921", "text": "func (dt *DateTime) Day() *Number {\n\topChain := dt.chain.enter(\"Day()\")\n\tdefer opChain.leave()\n\n\tif opChain.failed() {\n\t\treturn newNumber(opChain, float64(0))\n\t}\n\n\treturn newNumber(opChain, float64(dt.value.Day()))\n}", "title": "" }, { "docid": "b26090e263ef46de97e27ce42da53b13", "score": "0.445982", "text": "func (o ResourcePolicyWeeklyCycleDayOfWeekResponseOutput) Day() pulumi.StringOutput {\n\treturn o.ApplyT(func(v ResourcePolicyWeeklyCycleDayOfWeekResponse) string { return v.Day }).(pulumi.StringOutput)\n}", "title": "" }, { "docid": "9049f576084b06fe3be38749e1f26ec7", "score": "0.44491455", "text": "func (ln *localen) WeekdayNarrow(weekday time.Weekday) string {\n\treturn ln.daysNarrow[weekday]\n}", "title": "" }, { "docid": "7b53d63b0fa5f60c15d272060e7f87a5", "score": "0.44364962", "text": "func WeatherForecastHandler(w http.ResponseWriter, r *http.Request) *errors.AppError {\n\tctx := r.Context()\n\tcity, _ := ctx.Value(\"city\").(*schema.City)\n\tforecast, err := store.Forecast().ByCityID(city.ID)\n\tif err != nil {\n\t\treturn err\n\t}\n\tforecast.City = city\n\n\trespond.OK(w, forecast)\n\treturn nil\n}", "title": "" }, { "docid": "4fcc58dc5f4004220b30ae8399f99ec1", "score": "0.44031358", "text": "func (o TransferJobScheduleScheduleEndDatePtrOutput) Day() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *TransferJobScheduleScheduleEndDate) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Day\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "1f624a8b0e5d85776582f55fb12f4ef4", "score": "0.43747717", "text": "func New(tp elastictransport.Interface) *Forecast {\n\tr := &Forecast{\n\t\ttransport: tp,\n\t\tvalues: make(url.Values),\n\t\theaders: make(http.Header),\n\t\tbuf: gobytes.NewBuffer(nil),\n\t}\n\n\treturn r\n}", "title": "" }, { "docid": "5be20ac8ee7a9be7f9b1bc16baade211", "score": "0.43543997", "text": "func (fn *formulaFuncs) TODAY(argsList *list.List) formulaArg {\n\tif argsList.Len() != 0 {\n\t\treturn newErrorFormulaArg(formulaErrorVALUE, \"TODAY accepts no arguments\")\n\t}\n\tnow := time.Now()\n\t_, offset := now.Zone()\n\treturn newNumberFormulaArg(daysBetween(excelMinTime1900.Unix(), now.Unix()+int64(offset)) + 1)\n}", "title": "" }, { "docid": "5ee9bf432e60758fac2a8e70005477cb", "score": "0.4352936", "text": "func (dt DateTime) CeilDay() DateTime {\n\treturn dt.Replace(dt.Year(), dt.Month(), dt.Day(), 23, 59, 59, 999999999)\n}", "title": "" }, { "docid": "78b0ac9eda2a572bb08db2b4325c315b", "score": "0.43450406", "text": "func (al *AccessLayer) getServiceIDFromDay(delta time.Duration) string {\n\tl, _ := time.LoadLocation(\"MST\")\n\tnow := time.Now().In(l).Add(delta)\n\tif now.Hour() <= 4 {\n\t\tnow = now.Add(-5 * time.Hour)\n\t}\n\treturn serviceIDMap[now.Weekday().String()]\n}", "title": "" }, { "docid": "088a40d320e283027576665ca66f8d82", "score": "0.43429068", "text": "func (et ExfatTimestamp) Day() int {\n\treturn int(et&2031616) >> 16\n}", "title": "" }, { "docid": "7f2256c0e67c0060d785e45aff42b68a", "score": "0.4333485", "text": "func (o *GetForecastByCityIDParams) WithCnt(cnt *uint64) *GetForecastByCityIDParams {\n\to.SetCnt(cnt)\n\treturn o\n}", "title": "" }, { "docid": "ad6d778752dcd7fe49c25ee7bd3f7bd4", "score": "0.43311724", "text": "func (p *PunchCard) GetDay() int {\n\tif p == nil || p.Day == nil {\n\t\treturn 0\n\t}\n\treturn *p.Day\n}", "title": "" }, { "docid": "89a8b11b6c159c84d8830127f51b9c50", "score": "0.43159693", "text": "func (o *GetForecastByCityIDParams) WithTimeout(timeout time.Duration) *GetForecastByCityIDParams {\n\to.SetTimeout(timeout)\n\treturn o\n}", "title": "" }, { "docid": "d1243743540a2dc5b9791e5d91d9b245", "score": "0.43024954", "text": "func (o TransferJobScheduleScheduleStartDatePtrOutput) Day() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v *TransferJobScheduleScheduleStartDate) *int {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn &v.Day\n\t}).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "3c8835d2b34e3b4fd2cca772f055f39b", "score": "0.4295554", "text": "func (c *Client) SemidailyForecastLastRetrieved() time.Time {\n\treturn c.semidailyForecastLastRetrieved\n}", "title": "" }, { "docid": "60385d112e79cb005073dad71c8e1489", "score": "0.4282878", "text": "func (c *StatsGetIndexCall) ToDateDay(toDateDay int64) *StatsGetIndexCall {\n\tc.urlParams_.Set(\"toDate.day\", fmt.Sprint(toDateDay))\n\treturn c\n}", "title": "" }, { "docid": "60385d112e79cb005073dad71c8e1489", "score": "0.4282878", "text": "func (c *StatsGetIndexCall) ToDateDay(toDateDay int64) *StatsGetIndexCall {\n\tc.urlParams_.Set(\"toDate.day\", fmt.Sprint(toDateDay))\n\treturn c\n}", "title": "" }, { "docid": "45debfa5e3eddbb04693f3e73f6534d6", "score": "0.42773598", "text": "func DayTwelve(p *puzzle.Puzzle) {\n\tvar data map[string]interface{}\n\tjson.Unmarshal([]byte(daytwelveinput), &data)\n\ttotal := getAllNumbers(data, false)\n\ttotal2 := getAllNumbers(data, true)\n\tp.AddSolution(strconv.Itoa(total))\n\tp.AddSolution(strconv.Itoa(total2))\n}", "title": "" }, { "docid": "78b6938a2bc74ec35750833e26e01f03", "score": "0.4277179", "text": "func nthDay(t time.Time) (n int) {\n\tcDay := time.Date(t.Year(), t.Month(), 1, 0, 0, 0, 0, t.Location())\n\n\tfor cDay.Before(t) || cDay.Equal(t) {\n\t\tif cDay.Weekday() == t.Weekday() {\n\t\t\tn++\n\t\t}\n\t\tcDay = cDay.AddDate(0, 0, 1)\n\t}\n\treturn\n}", "title": "" }, { "docid": "5cee97c1b16f9576377f40e9cc27b4d3", "score": "0.42690474", "text": "func (c *StatsGetIndexCall) FromDateDay(fromDateDay int64) *StatsGetIndexCall {\n\tc.urlParams_.Set(\"fromDate.day\", fmt.Sprint(fromDateDay))\n\treturn c\n}", "title": "" }, { "docid": "5cee97c1b16f9576377f40e9cc27b4d3", "score": "0.42690474", "text": "func (c *StatsGetIndexCall) FromDateDay(fromDateDay int64) *StatsGetIndexCall {\n\tc.urlParams_.Set(\"fromDate.day\", fmt.Sprint(fromDateDay))\n\treturn c\n}", "title": "" }, { "docid": "900c32bd4709cd0a6aba415c10a0a5e3", "score": "0.42625824", "text": "func (n *NasaApodClient) FetchTodayAPOD(hd bool) (*Apod, string, error) {\n\treturn n.FetchAPOD(\"\", hd)\n}", "title": "" }, { "docid": "0ff91264cfb85d710dae011057dbf441", "score": "0.42564836", "text": "func findDataPointClosestToNow(fc *forecast) dataPoint {\n\tconst durationMax = time.Duration(math.MaxInt64)\n\n\t// closest to time.Now()\n\tvar closestDataPoint dataPoint\n\tclosestDistance := durationMax\n\n\tfor _, dp := range fc.TimeSeries {\n\t\tdistance := durationAbs(dp.ValidTime.Sub(time.Now()))\n\t\tif distance < closestDistance {\n\t\t\tclosestDataPoint = dp\n\t\t\tclosestDistance = distance\n\t\t}\n\t}\n\n\treturn closestDataPoint\n}", "title": "" }, { "docid": "33017451665f232d94dae35c1ff1f5dd", "score": "0.4249253", "text": "func Today() *Trending {\n\treturn New().Since(today)\n}", "title": "" }, { "docid": "6beff41e4e89b555f9567f27c432d872", "score": "0.4248183", "text": "func (w *Weather) SetForecastTemperatureData(data *openweather.DailyForecast5) {\n\tlog.Println(\"weather\", \"SetForecastTemperatureData\", fmt.Sprintf(\"%+v\\n\", data))\n\n\tcondition := data.List[0].Weather[0].ID\n\timage, err := assets.GetBackgroundImage(condition)\n\tif err != nil {\n\t\tlog.Panicln(\"weather\", \"SetForecastTemperatureData\", \"error while getting background image\", err)\n\t} else {\n\t\tw.SetBackground(image)\n\t}\n\n\tw.today.updateInformation(\n\t\tdata.List[0].Temp.Day,\n\t\tdata.List[0].Temp.Min,\n\t\tdata.List[0].Temp.Max,\n\t\tdata.List[0].Weather[0].Icon)\n\tw.tomorrow.updateInformation(\n\t\tdata.List[1].Temp.Day,\n\t\tdata.List[1].Temp.Min,\n\t\tdata.List[1].Temp.Max,\n\t\tdata.List[1].Weather[0].Icon)\n\tw.afterTomorrow.updateInformation(\n\t\tdata.List[2].Temp.Day,\n\t\tdata.List[2].Temp.Min,\n\t\tdata.List[2].Temp.Max,\n\t\tdata.List[2].Weather[0].Icon)\n}", "title": "" }, { "docid": "b2a1ea2b1c7c4d17c45fe86d7d4995d3", "score": "0.42344704", "text": "func (c *StatsQuerySearchapplicationsGetCall) ToDateDay(toDateDay int64) *StatsQuerySearchapplicationsGetCall {\n\tc.urlParams_.Set(\"toDate.day\", fmt.Sprint(toDateDay))\n\treturn c\n}", "title": "" }, { "docid": "a67c960e086d23f91472fcd9b513f946", "score": "0.42273304", "text": "func (s *Service) ThirtyDayArchive(c context.Context, mid int64, ty int8) (res []*data.ThirtyDay, err error) {\n\ttyStr, _ := data.IncrTy(ty)\n\tif res, err = s.data.ThirtyDayArchiveCache(c, mid, tyStr); err != nil && len(res) != 0 {\n\t\tlog.Info(\"creatorDataArchive mid(%d) type(%d) cache hit\", mid, ty)\n\t\treturn\n\t}\n\tif res, err = s.data.ThirtyDayArchive(c, mid, ty); len(res) != 0 {\n\t\ttimeSlice := make([]int64, 0, 30)\n\t\tresMap := make(map[int64]int64)\n\t\tfor i := 30; i > 0; i-- { //从昨天往前推算30天生成30天对应的时间戳\n\t\t\tvar tm time.Time\n\t\t\tdt := time.Now().AddDate(0, 0, -1-i).Add(-12 * time.Hour).Format(\"20060102\")\n\t\t\ttm, err = time.Parse(\"20060102\", dt)\n\t\t\tif err != nil {\n\t\t\t\tlog.Error(\"time.Parse error(%v)\", err)\n\t\t\t\treturn\n\t\t\t}\n\t\t\tt := tm.Unix()\n\t\t\ttimeSlice = append(timeSlice, t)\n\t\t}\n\t\tfor _, v := range res { //映射原始时间戳集合\n\t\t\tresMap[v.DateKey] = v.DateKey\n\t\t}\n\t\tif len(res) < 30 { //如果当前的数据不够30条则补齐30条\n\t\t\tfor _, v := range timeSlice {\n\t\t\t\tif _, ok := resMap[v]; !ok { //当前时间戳不在原始时间戳集合存在则使用生成的时间戳\n\t\t\t\t\ttd := &data.ThirtyDay{\n\t\t\t\t\t\tDateKey: v,\n\t\t\t\t\t}\n\t\t\t\t\tres = append(res, td)\n\t\t\t\t}\n\t\t\t\tif len(res) == 30 { //添加到30条为止\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t\tlog.Info(\"s.data.ThirtyDayArchive append mid(%d) type(%d) return data(%+v)\", mid, ty, res)\n\t\t}\n\t\ttds := make([]*data.ThirtyDay, 0, 30)\n\t\tskeys := make([]int64, 0, 30)\n\t\ttdMap := make(map[int64]int64)\n\t\tfor _, v := range res {\n\t\t\tif v != nil {\n\t\t\t\ttdMap[v.DateKey] = v.TotalIncr //设置时间戳和动态数据的键值对\n\t\t\t\tskeys = append(skeys, v.DateKey) //获取时间戳集合\n\t\t\t}\n\t\t}\n\t\tsort.Slice(skeys, func(i, j int) bool { //对时间戳做降序排列\n\t\t\treturn skeys[i] > skeys[j]\n\t\t})\n\t\tfor _, k := range skeys { //按照排序好的时间戳组装最终的返回数据\n\t\t\tif v, ok := tdMap[k]; ok {\n\t\t\t\ttd := &data.ThirtyDay{}\n\t\t\t\ttd.DateKey = k\n\t\t\t\ttd.TotalIncr = v\n\t\t\t\ttds = append(tds, td)\n\t\t\t\tif len(tds) == 30 { //只取30条\n\t\t\t\t\tbreak\n\t\t\t\t}\n\t\t\t}\n\t\t}\n\t\tlog.Info(\"s.data.ThirtyDayArchive mid(%d) type(%d) cache miss res(%+v)\", mid, ty, tds)\n\t\tres = tds\n\t\ts.data.AddCache(func() {\n\t\t\ts.data.AddThirtyDayArchiveCache(context.Background(), mid, tyStr, tds)\n\t\t})\n\t}\n\treturn\n}", "title": "" }, { "docid": "dea3405f56df6f1885321f793c3b6c5c", "score": "0.4223501", "text": "func RunDay(verbose bool) {\n\tvar aResult int\n\tvar bResult int\n\tvar err error\n\n\tif verbose {\n\t\tfmt.Printf(\"\\n%v Output:\\n\", name)\n\t}\n\n\taResult, err = a()\n\tif err != nil {\n\t\tfmt.Printf(\"%va: **** Error: %q ****\\n\", name, err)\n\t} else {\n\t\tfmt.Printf(\"%va: Program Result = %v\\n\", name, aResult)\n\t}\n\n\tbResult, err = b(verbose)\n\tif err != nil {\n\t\tfmt.Printf(\"%vb: **** Error: %q ****\\n\", name, err)\n\t} else {\n\t\tfmt.Printf(\"%vb: Program Result = %v\\n\", name, bResult)\n\t}\n}", "title": "" }, { "docid": "b3a60fad5d69594341a2b55a0c9289ff", "score": "0.42205918", "text": "func RunDay(verbose bool) {\n\tvar aResult int\n\tvar bResult int\n\tvar err error\n\n\tif verbose {\n\t\tfmt.Printf(\"\\n%v Output:\\n\", name)\n\t}\n\n\taResult, err = a(verbose)\n\tif err != nil {\n\t\tfmt.Printf(\"%va: **** Error: %q ****\\n\", name, err)\n\t} else {\n\t\tfmt.Printf(\"%va: Program Result = %v\\n\", name, aResult)\n\t}\n\n\tbResult, err = b(verbose)\n\tif err != nil {\n\t\tfmt.Printf(\"%vb: **** Error: %q ****\\n\", name, err)\n\t} else {\n\t\tfmt.Printf(\"%vb: Program Result = %v\\n\", name, bResult)\n\t}\n}", "title": "" }, { "docid": "135984e63de261ba3661fc24f020195a", "score": "0.4206393", "text": "func (c *StatsQuerySearchapplicationsGetCall) FromDateDay(fromDateDay int64) *StatsQuerySearchapplicationsGetCall {\n\tc.urlParams_.Set(\"fromDate.day\", fmt.Sprint(fromDateDay))\n\treturn c\n}", "title": "" }, { "docid": "9e1ad21edeef0ffbcd2e6d4bed64941e", "score": "0.42063475", "text": "func (dt *DateTime) WeekDay() *Number {\n\topChain := dt.chain.enter(\"WeekDay()\")\n\tdefer opChain.leave()\n\n\tif opChain.failed() {\n\t\treturn newNumber(opChain, float64(0))\n\t}\n\n\treturn newNumber(opChain, float64(dt.value.Weekday()))\n}", "title": "" }, { "docid": "a15ab956c854e78133aa116cd7aa1829", "score": "0.42045763", "text": "func (c *StatsSessionSearchapplicationsGetCall) ToDateDay(toDateDay int64) *StatsSessionSearchapplicationsGetCall {\n\tc.urlParams_.Set(\"toDate.day\", fmt.Sprint(toDateDay))\n\treturn c\n}", "title": "" }, { "docid": "4b4d580e9b11a4cab1197f7343fca98b", "score": "0.42038897", "text": "func (dt DateTime) ReplaceDay(day int) DateTime {\n\treturn NewDateTime(\n\t\tdt.Year(),\n\t\tdt.Month(),\n\t\tday,\n\t\tdt.Hour(),\n\t\tdt.Minute(),\n\t\tdt.Second(),\n\t\tdt.Nanosecond(),\n\t\tdt.Timezone(),\n\t)\n}", "title": "" }, { "docid": "93a0e3ac775f7f6d89bd8907678eff1f", "score": "0.4192219", "text": "func (c *StatsIndexDatasourcesGetCall) ToDateDay(toDateDay int64) *StatsIndexDatasourcesGetCall {\n\tc.urlParams_.Set(\"toDate.day\", fmt.Sprint(toDateDay))\n\treturn c\n}", "title": "" }, { "docid": "93a0e3ac775f7f6d89bd8907678eff1f", "score": "0.4192219", "text": "func (c *StatsIndexDatasourcesGetCall) ToDateDay(toDateDay int64) *StatsIndexDatasourcesGetCall {\n\tc.urlParams_.Set(\"toDate.day\", fmt.Sprint(toDateDay))\n\treturn c\n}", "title": "" }, { "docid": "8567f9f5dcc625e413ffb6771d1ac359", "score": "0.41906303", "text": "func (a *API) GetDataFor7Days() (GA, error) {\n\tclient, err := a.GetOAuthClient()\n\tif err != nil {\n\t\treturn GA{}, err\n\t}\n\n\tanalyticsService, err := analytics.New(client)\n\tif err != nil {\n\t\treturn GA{}, err\n\t}\n\n\tgaData := analyticsService.Data.Ga.Get(a.ViewID, \"7daysAgo\", \"yesterday\",\n\t\t\"ga:users, ga:impressions, ga:adClicks, ga:organicSearches\")\n\tgaData.Dimensions(\"ga:day\")\n\tgaData.SamplingLevel(\"HIGHER_PRECISION\")\n\tgaData.Output(\"json\")\n\n\td, err := gaData.Do()\n\tif err != nil {\n\t\treturn GA{}, err\n\t}\n\n\tbytes, err := d.MarshalJSON()\n\tif err != nil {\n\t\treturn GA{}, err\n\t}\n\n\tgaDatas := []GAData{}\n\n\tfor _, value := range d.Rows {\n\t\tgaData := GAData{}\n\t\tgaData.Date = value[0]\n\t\tgaData.Users = value[1]\n\t\tgaData.AdImpressions = value[2]\n\t\tgaData.AdClicks = value[3]\n\t\tgaData.OrganicSearches = value[4]\n\t\tgaDatas = append(gaDatas, gaData)\n\t}\n\n\tga := GA{}\n\tga.GADatas = gaDatas\n\tga.JSON = string(bytes)\n\tga.URL = a.URL\n\n\treturn ga, nil\n}", "title": "" }, { "docid": "f8a3e280258da3d2824c2cbd41d93147", "score": "0.41803312", "text": "func (c *StatsIndexDatasourcesGetCall) FromDateDay(fromDateDay int64) *StatsIndexDatasourcesGetCall {\n\tc.urlParams_.Set(\"fromDate.day\", fmt.Sprint(fromDateDay))\n\treturn c\n}", "title": "" }, { "docid": "f8a3e280258da3d2824c2cbd41d93147", "score": "0.41803312", "text": "func (c *StatsIndexDatasourcesGetCall) FromDateDay(fromDateDay int64) *StatsIndexDatasourcesGetCall {\n\tc.urlParams_.Set(\"fromDate.day\", fmt.Sprint(fromDateDay))\n\treturn c\n}", "title": "" }, { "docid": "dc61968ba2ef3b21747932c6637fc9fb", "score": "0.41785327", "text": "func (c *StatsSessionSearchapplicationsGetCall) FromDateDay(fromDateDay int64) *StatsSessionSearchapplicationsGetCall {\n\tc.urlParams_.Set(\"fromDate.day\", fmt.Sprint(fromDateDay))\n\treturn c\n}", "title": "" }, { "docid": "c68372441f3d29040eed4d7e0c501eff", "score": "0.41721058", "text": "func (o *SummaryEventResponse) GetToday() int32 {\n\tif o == nil || o.Today == nil {\n\t\tvar ret int32\n\t\treturn ret\n\t}\n\treturn *o.Today\n}", "title": "" }, { "docid": "d29524b18a9ab0df32d885b5374718d1", "score": "0.41570607", "text": "func (c *StatsGetQueryCall) FromDateDay(fromDateDay int64) *StatsGetQueryCall {\n\tc.urlParams_.Set(\"fromDate.day\", fmt.Sprint(fromDateDay))\n\treturn c\n}", "title": "" }, { "docid": "37b14f522b3b31bd918f82508734309f", "score": "0.41550878", "text": "func (o ScheduledAuditOutput) DayOfWeek() ScheduledAuditDayOfWeekPtrOutput {\n\treturn o.ApplyT(func(v *ScheduledAudit) ScheduledAuditDayOfWeekPtrOutput { return v.DayOfWeek }).(ScheduledAuditDayOfWeekPtrOutput)\n}", "title": "" }, { "docid": "7fbe56ed3b6c64de34e2f38aaf9ab737", "score": "0.41484696", "text": "func Day() string {\n\treturn randomFrom(jsonData.Days)\n}", "title": "" }, { "docid": "26dbbcc5438fd1ec5d0e121a8d02b01a", "score": "0.41434017", "text": "func (gm GlobalManager) GetPastDay(ctx sdk.Context, unixTime int64) (int64, sdk.Error) {\n\tglobalTime, err := gm.storage.GetGlobalTime(ctx)\n\tif err != nil {\n\t\treturn 0, err\n\t}\n\tpastDay := (unixTime - globalTime.ChainStartTime) / (3600 * 24)\n\tif pastDay < 0 {\n\t\treturn 0, nil\n\t}\n\treturn pastDay, nil\n}", "title": "" }, { "docid": "671109e415af0ae21577ad10ce76deec", "score": "0.41385898", "text": "func getSlopeOfTenkan(chart *charts.CloudChart) (decimal.Decimal, error) {\n\tcandles := chart.GetCandles()\n\tchartLength := len(candles) - 1\n\n\tif chartLength > 2 {\n\t\treturn utils.StringToDecimal(\"0\"), errors.New(\"not enough candles\")\n\t}\n\n\tcurrentCandle := candles[chartLength]\n\tpreviousCandle := candles[chartLength-1]\n\treturn currentCandle.Tenkan.Sub(previousCandle.Tenkan), nil\n}", "title": "" }, { "docid": "f752d4ca26eeeb6e235dc060d3e2abf5", "score": "0.41379547", "text": "func (o *GetForecastByCityIDParams) WithID(id uint64) *GetForecastByCityIDParams {\n\to.SetID(id)\n\treturn o\n}", "title": "" }, { "docid": "70d91ea5e1f95951f87feb134180ea44", "score": "0.41272226", "text": "func getDayOnBasis(y, m, d, basis int) int {\n\tif !is30BasisMethod(basis) {\n\t\treturn d\n\t}\n\tday := d\n\tdim := getDaysInMonth(y, m)\n\tif day > 30 || d >= dim || day >= dim {\n\t\tday = 30\n\t}\n\treturn day\n}", "title": "" }, { "docid": "b7ec5a485f9e153ebd7d9503e4fcf38e", "score": "0.41217107", "text": "func (p Peer) GetBday() int64 {\n\ti := p.Get(bday)\n\tswitch i := i.(type) {\n\tcase int64:\n\t\treturn i\n\tcase int:\n\t\treturn int64(i)\n\tdefault:\n\t\treturn 0\n\t}\n}", "title": "" }, { "docid": "1cc20d5b3bb30fc450d09fde2614b3f8", "score": "0.41176924", "text": "func RunDay(verbose bool) {\n\tvar aResult int\n\tvar err error\n\n\tif verbose {\n\t\tfmt.Printf(\"\\n%v Output:\\n\", name)\n\t}\n\n\taResult, err = a()\n\tif err != nil {\n\t\tfmt.Printf(\"%va: **** Error: %q ****\\n\", name, err)\n\t} else {\n\t\tfmt.Printf(\"%va: Program Result = %v\\n\", name, aResult)\n\t}\n\n\terr = b()\n\tif err != nil {\n\t\tfmt.Printf(\"%vb: **** Error: %q ****\\n\", name, err)\n\t} else {\n\t\tfmt.Printf(\"%vb: See display above\\n\", name)\n\t}\n}", "title": "" }, { "docid": "79529f83da2d4e1ae1e35ee35cf1701b", "score": "0.41156814", "text": "func (dt DateTime) Day() int {\n\treturn dt.src.Day()\n}", "title": "" }, { "docid": "e28cc9b60fc1a419efd18d6442c5270d", "score": "0.41095978", "text": "func GetWeather() (Weather, error) {\n\tvar weather Weather\n\n\tresp, err := soup.Get(NaverWeather)\n\tif err != nil {\n\t\tfmt.Println(\"Check your HTML connection.\")\n\t\treturn weather, err // nil\n\t}\n\tdoc := soup.HTMLParse(resp)\n\n\tcurrentTempInt := doc.Find(\"strong\", \"class\", \"current\").Text() + \"도\"\n\n\tcurrentStatus := doc.Find(\"span\", \"class\", \"weather\")\n\n\t// ! 해외 기상은 일출부터 일몰 전이 낮, 일몰부터 일출 전이 밤\n\ttemps := doc.FindAll(\"span\", \"class\", \"data\")\n\tDayTemp := temps[0].Text() + \"도\"\n\tNightTemp := temps[1].Text() + \"도\"\n\n\trains := doc.FindAll(\"span\", \"class\", \"rainfall\")\n\tDayRain := rains[0].Text()\n\tNightRain := rains[1].Text()\n\n\t// [미세먼지, 초미세먼지, 자외선, 일몰 시간]\n\tstatuses := doc.FindAll(\"em\", \"class\", \"level_text\")\n\n\t// 날씨 아이콘\n\ti := doc.Find(\"div\", \"class\", \"today_weather\").Find(\"i\").Attrs()\n\timg := i[\"data-ico\"]\n\n\t// struct 값 변경\n\tweather.CurrentTemp = currentTempInt\n\tweather.CurrentStatus = currentStatus.Text()\n\n\tweather.MaxTemp = DayTemp // Assume that (day temp > night temp) in general\n\tweather.MinTemp = NightTemp\n\n\tweather.RainDay = DayRain\n\tweather.RainNight = NightRain\n\n\tweather.FineDust = statuses[0].Text()\n\tweather.UltraDust = statuses[1].Text()\n\tweather.UV = statuses[2].Text()\n\n\tif strings.Contains(i[\"class\"], \"night\") {\n\t\tweather.Icon = img + \"_night\"\n\t} else {\n\t\tweather.Icon = img\n\t}\n\treturn weather, nil\n}", "title": "" }, { "docid": "c5fc07f010a5137de79a9a49a3485547", "score": "0.41067725", "text": "func (dt DateTime) Day() int {\n\treturn dt.Time().Day()\n}", "title": "" }, { "docid": "2cfa8e490ff1c0b97ec769c2fa84b67f", "score": "0.41063854", "text": "func (se SumEntry) Day() int {\n\treturn se.Date.Day()\n}", "title": "" }, { "docid": "fb991bbe5d6a860f8028f4bc11241fcd", "score": "0.41063327", "text": "func (c *StatsGetQueryCall) ToDateDay(toDateDay int64) *StatsGetQueryCall {\n\tc.urlParams_.Set(\"toDate.day\", fmt.Sprint(toDateDay))\n\treturn c\n}", "title": "" }, { "docid": "61301221bb074ea159a7ff3465b0a7e3", "score": "0.4106175", "text": "func (dt DateTime) FloorDay() DateTime {\n\treturn dt.Replace(dt.Year(), dt.Month(), dt.Day(), 0, 0, 0, 0)\n}", "title": "" }, { "docid": "b7e01370a35533aa2ecdcb1a944dedae", "score": "0.41032466", "text": "func (h *Handler) FetchDailyTimeSeries(w http.ResponseWriter, r *http.Request, params httprouter.Params) error {\n\tstockSymbol := params.ByName(\"stock\")\n\n\tstock, err := h.Stocky.Postgres.GetOrCreateStock(stockSymbol)\n\tif err != nil {\n\t\tError(w, err)\n\t\treturn err\n\t}\n\n\tredisKey := fmt.Sprintf(\"stocky_%s\", stockSymbol)\n\t_, err = h.Stocky.Redis.Get(redisKey)\n\tif err == redis.Nil {\n\t\terr = h.updateDaily(stockSymbol, redisKey, stock.ID)\n\t\tif err != nil {\n\t\t\tError(w, err)\n\t\t\treturn err\n\t\t}\n\t} else if err != nil {\n\t\tError(w, err)\n\t\treturn err\n\t}\n\n\tstockDailySeries, err := h.Stocky.Postgres.FetchDailySeriesByStock(stock.ID)\n\tif err != nil {\n\t\tError(w, err)\n\t\treturn err\n\t}\n\n\tOK(w, entity.NewStockDailyResponse(stock, stockDailySeries), \"\")\n\treturn nil\n}", "title": "" }, { "docid": "c4954488384b8ba178c106e4691ee80a", "score": "0.4101112", "text": "func (c *Client) UpdateSemidailyForecast() error {\n\tf, err := getSemidailyForecastForGridpoint(c.httpClient, c.httpUserAgentString, c.apiURLString, c.gridpoint)\n\tif err != nil {\n\t\treturn err\n\t}\n\tc.semidailyForecast = *f\n\tc.semidailyForecastLastRetrieved = f.TimeRetrieved\n\treturn nil\n}", "title": "" }, { "docid": "e43feb96678f62912b66ac60bb4a24c9", "score": "0.41009402", "text": "func (o ResourcePolicyWeeklyCycleDayOfWeekOutput) Day() ResourcePolicyWeeklyCycleDayOfWeekDayPtrOutput {\n\treturn o.ApplyT(func(v ResourcePolicyWeeklyCycleDayOfWeek) *ResourcePolicyWeeklyCycleDayOfWeekDay { return v.Day }).(ResourcePolicyWeeklyCycleDayOfWeekDayPtrOutput)\n}", "title": "" }, { "docid": "776a865caac76c08578c4b1d66002591", "score": "0.40951687", "text": "func (w *WundergroundConditionsGetter) ParseYesterday(resp []byte) (icon string, tempF float64, precipIn float64, err error) {\n\tvar jt map[string]interface{}\n\tif err := json.Unmarshal(resp, &jt); err != nil {\n\t\treturn \"\", 0.0, 0.0, err\n\t}\n\n\tobsi, err := GetPath(jt, \"history/observations\")\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"%v: \\n\\n%s\", err, string(resp))\n\t}\n\tobs, ok := obsi.([]interface{})\n\tif !ok {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"bad observations array: \\n%s\\n\", string(resp))\n\t}\n\ticon, err = w.getSummaryIcon(obs)\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"%v: \\n\\n%s\", err, string(resp))\n\t}\n\n\tti, err := GetPath(jt, \"history/dailysummary/0/maxtempi\")\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"%v: \\n\\n%s\", err, string(resp))\n\t}\n\n\tpi, err := GetPath(jt, \"history/dailysummary/0/precipi\")\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"%v: \\n\\n%s\", err, string(resp))\n\t}\n\n\ttempF, err = strIfToFloat32(ti)\n\tif err != nil {\n\t\treturn \"\", 0.0, 0.0, fmt.Errorf(\"tempF: %s\", err)\n\t}\n\n\tprecipIn, err = strIfToFloat32(pi)\n\tif err != nil {\n\t\tlog.Errorf(\"precipIn has non-float value %s, returning 0.0\", pi)\n\t\treturn icon, tempF, 0.0, nil\n\t}\n\n\treturn\n}", "title": "" }, { "docid": "5c239cc8a83872fffd76e02aeb562a72", "score": "0.40896738", "text": "func NewGetForecastByZIPCodeOK() *GetForecastByZIPCodeOK {\n\treturn &GetForecastByZIPCodeOK{}\n}", "title": "" }, { "docid": "306039bcd32e39bec5bbfce5e24a2e11", "score": "0.40896308", "text": "func (o BucketIntelligentTieringConfigurationTieringOutput) Days() pulumi.IntOutput {\n\treturn o.ApplyT(func(v BucketIntelligentTieringConfigurationTiering) int { return v.Days }).(pulumi.IntOutput)\n}", "title": "" }, { "docid": "a3a072c67e0cf8e83dba32551eedda09", "score": "0.4087963", "text": "func (c *Client) GetMountainAreaForecast(area string) (*MountainAreaInput, error) {\n\t// TODO check that area is a string that's valid\n\n\tpath := fmt.Sprintf(\"/public/data/txt/wxfcs/mountainarea/%s/%s\", \"json\", area)\n\tresp, err := c.Get(path, nil)\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tvar b *MountainAreaInput\n\tif err := decodeJSON(&b, resp.Body); err != nil {\n\t\treturn nil, err\n\t}\n\n\treturn b, nil\n}", "title": "" }, { "docid": "5f4857ba00e5c3d2a8305cf666da6c66", "score": "0.40854988", "text": "func RunDay(verbose bool) {\n\tvar aResult int\n\tvar bResult int\n\tvar err error\n\n\tif verbose {\n\t\tfmt.Printf(\"\\n%v Output:\\n\", name)\n\t}\n\n\taResult, err = a()\n\tif err != nil {\n\t\tfmt.Printf(\"%va: **** Error: %q ****\\n\", name, err)\n\t} else {\n\t\tfmt.Printf(\"%va: Program Result = %v\\n\", name, aResult)\n\t}\n\n\tbResult, err = b()\n\tif err != nil {\n\t\tfmt.Printf(\"%vb: **** Error: %q ****\\n\", name, err)\n\t} else {\n\t\tfmt.Printf(\"%vb: Program Result = %v\\n\", name, bResult)\n\t}\n}", "title": "" }, { "docid": "8ed4b659f393cf89600cab845ed2d9ba", "score": "0.40786228", "text": "func (o InstanceDenyMaintenancePeriodEndDateOutput) Day() pulumi.IntPtrOutput {\n\treturn o.ApplyT(func(v InstanceDenyMaintenancePeriodEndDate) *int { return v.Day }).(pulumi.IntPtrOutput)\n}", "title": "" }, { "docid": "80f63328a0337aa5c01a409ab4b39900", "score": "0.40556988", "text": "func WeatherTextForToday(place string) (result string, err error) {\n\treturn httpGet(baseURL+url.QueryEscape(place)+\"?0\", false)\n}", "title": "" }, { "docid": "7c96be918cf268b1cf7699374bfb87fa", "score": "0.4047033", "text": "func (c *StatsGetSessionCall) FromDateDay(fromDateDay int64) *StatsGetSessionCall {\n\tc.urlParams_.Set(\"fromDate.day\", fmt.Sprint(fromDateDay))\n\treturn c\n}", "title": "" }, { "docid": "4e362694b8273fe0ade6c4f8fb6b78df", "score": "0.40448853", "text": "func unmarshal(info []byte) []Res {\n\t// to struct\n\tvar data R1\n\terr := json.Unmarshal(info, &data)\n\tcheck(err)\n\tfCast := data.D1.Location.Forecast\n\treturn fCast\n}", "title": "" }, { "docid": "71ce78fd54b0f3c9834c51b985f9b014", "score": "0.40380105", "text": "func (c *Client) HourlyForecastLastRetrieved() time.Time {\n\treturn c.hourlyForecastLastRetrieved\n}", "title": "" }, { "docid": "f4bd0d46fb69e770f3fa6a4cc64b00a6", "score": "0.4037489", "text": "func (m *RecurrencePattern) GetDayOfMonth()(*int32) {\n return m.dayOfMonth\n}", "title": "" }, { "docid": "6126ea0111a44c254682b73e3f45a104", "score": "0.40356845", "text": "func Bday(name, from string) (string, error) {\n\treturn makeRequest(\"bday\", name, from)\n}", "title": "" }, { "docid": "f480b88670878caa99d1ea600cf84423", "score": "0.40331975", "text": "func Tuesday(t time.Time) time.Time {\n\treturn t.AddDate(0, 0, -Weekday(t)+2)\n}", "title": "" } ]
de285f5eb838169c2508ef153410c57d
Get the current namespace for an environment
[ { "docid": "a0b57663217b6638608ba882e4703154", "score": "0.6527862", "text": "func Get(env string) (string, error) {\n\tif len(env) == 0 {\n\t\treturn \"\", errors.New(\"Missing env value\")\n\t}\n\n\tif ns, err := config.Get(config.Path(\"namespaces\", env, \"current\")); err != nil {\n\t\treturn \"\", err\n\t} else if len(ns) > 0 {\n\t\treturn ns, nil\n\t}\n\n\treturn registry.DefaultDomain, nil\n}", "title": "" } ]
[ { "docid": "790fec867e62c2eb542d56569d8c5eb2", "score": "0.732134", "text": "func getNamespace() string {\n\treturn util.GetEnv(util.OpenEBSNamespace)\n}", "title": "" }, { "docid": "87db7dd2ceb6688738afa70ca9a2f33c", "score": "0.7232082", "text": "func GetNamespace() string {\n\tv := GetEnv(\"NAMESPACE\", \"services\")\n\treturn v\n}", "title": "" }, { "docid": "35289f9cdcbc0e639a18c550e9572feb", "score": "0.72060996", "text": "func GetNamespaceFromEnv() string {\n\tnamespace := os.Getenv(NamespaceEnv)\n\tif namespace == \"\" {\n\t\tnamespace = random.NewPetName(2)\n\t}\n\treturn namespace\n}", "title": "" }, { "docid": "8e14f75aac134dfae086eaa6909f25a0", "score": "0.7170497", "text": "func (c *EnvConfig) Namespace() string {\n\tcallPtr, _, _, _ := runtime.Caller(0)\n\tvalue := getConfigValueFromEnv(util.NameOfFunction(callPtr))\n\n\treturn value\n}", "title": "" }, { "docid": "18c80f1df5db3785a22685382793ac50", "score": "0.7097988", "text": "func GetCurrentNameSpace() string {\n\tcurrentNameSpace := os.Getenv(\"DEBUG_NAMESPACE\")\n\tif currentNameSpace != \"\" {\n\t\treturn currentNameSpace\n\t}\n\t_, err := os.Stat(currentNamespacePath)\n\tif err != nil {\n\t\treturn currentNameSpace\n\t}\n\tdata, err := ioutil.ReadFile(currentNamespacePath)\n\tif err != nil {\n\t\treturn currentNameSpace\n\t}\n\treturn string(data)\n}", "title": "" }, { "docid": "7cd35993d96c19c6702d07d3868c769e", "score": "0.6999727", "text": "func (env *Environment) CurrentNamespace() namespace.Namespace {\n\treturn env.currentNamespace\n}", "title": "" }, { "docid": "17f44b0cc6fb6b3b8353433bbd1211c8", "score": "0.6954321", "text": "func getWatchNamespace() (string, error) {\n\tconst WatchNamespaceEnvVar = \"WATCH_NAMESPACE\"\n\tns, found := os.LookupEnv(WatchNamespaceEnvVar)\n\tif !found {\n\t\treturn \"\", fmt.Errorf(\"%s must be set\", WatchNamespaceEnvVar)\n\t}\n\treturn ns, nil\n}", "title": "" }, { "docid": "b6181a9d5478a96f64618da23f3ceb23", "score": "0.69267994", "text": "func GetNamespace() string {\n\treturn currentNamespace\n}", "title": "" }, { "docid": "cd43373ea7bae57d369f9b8a976ff159", "score": "0.6894537", "text": "func NamespaceFromEnv() string {\n\tns := os.Getenv(EnvNamespace)\n\tif ns == \"\" {\n\t\treturn DefaultNamespace\n\t}\n\treturn ns\n}", "title": "" }, { "docid": "f4fbcaa03cf28ad952a0f6de4884b219", "score": "0.68762094", "text": "func (sh *systemHandler) GetCurrentNamespace() (ns netns.NsHandle, err error) {\n\treturn netns.Get()\n}", "title": "" }, { "docid": "36b08571514f19d8d42a9b60c52200b6", "score": "0.6866647", "text": "func getNamespaceFromCurrentContext() (string, error) {\n\t// start -- the following should be included if we support a --kubeconfg flag\n\t// // If a flag is specified with the config location, use that\n\t// if len(kubeconfig) > 0 {\n\t// \treturn loadNamespaceWithContext(\"\", &clientcmd.ClientConfigLoadingRules{ExplicitPath: kubeconfig}, context)\n\t// }\n\t// end -- support --kubeconfig\n\n\tloadingRules := clientcmd.NewDefaultClientConfigLoadingRules()\n\tif _, ok := os.LookupEnv(\"HOME\"); !ok {\n\t\tu, err := user.Current()\n\t\tif err != nil {\n\t\t\treturn \"default\", fmt.Errorf(\"could not get current user: %v\", err)\n\t\t}\n\t\tloadingRules.Precedence = append(loadingRules.Precedence, path.Join(u.HomeDir, clientcmd.RecommendedHomeDir, clientcmd.RecommendedFileName))\n\t}\n\n\treturn getNamespaceWithContext(\"\", loadingRules)\n}", "title": "" }, { "docid": "700355abf4e8af51f7a7d562a1df8d47", "score": "0.686356", "text": "func GetCurrentNamespace() (string, error) {\n\tdat, err := ioutil.ReadFile(\"/var/run/secrets/kubernetes.io/serviceaccount/namespace\")\n\tif err != nil {\n\t\treturn \"\", err\n\t}\n\n\treturn string(dat), nil\n}", "title": "" }, { "docid": "270976742df19d171b3e76a833c3adb9", "score": "0.6848778", "text": "func GetNamespace(c context.Context) string {\n\treturn Raw(c).GetNamespace()\n}", "title": "" }, { "docid": "6731937557440bc244ad42a56dafc7e2", "score": "0.68209606", "text": "func getWatchNamespace() (string, error) {\n\t// WatchNamespaceEnvVar is the constant for env variable WATCH_NAMESPACE\n\t// which specifies the Namespace to watch.\n\t// An empty value means the operator is running with cluster scope.\n\tvar watchNamespaceEnvVar = \"WATCH_NAMESPACE\"\n\n\tns, found := os.LookupEnv(watchNamespaceEnvVar)\n\tif !found {\n\t\treturn \"\", fmt.Errorf(\"%s must be set\", watchNamespaceEnvVar)\n\t}\n\treturn ns, nil\n}", "title": "" }, { "docid": "c1fb973792430ff01e4715020c579fe7", "score": "0.6799839", "text": "func getWatchNamespace() (string, error) {\n\t// WatchNamespaceEnvVar is the constant for env variable WATCH_NAMESPACE\n\t// which specifies the Namespace to watch.\n\t// An empty value means the operator is running with cluster scope.\n\twatchNamespaceEnvVar := \"WATCH_NAMESPACE\"\n\n\tns, found := os.LookupEnv(watchNamespaceEnvVar)\n\tif !found {\n\t\treturn \"\", fmt.Errorf(\"%s must be set\", watchNamespaceEnvVar)\n\t}\n\n\treturn ns, nil\n}", "title": "" }, { "docid": "f348260de747b1a6054914de62284ec8", "score": "0.6643715", "text": "func CurrentNamespace(kubeconfigPath []string) string {\n\tcfg := Get(kubeconfigPath)\n\tif cfg == nil {\n\t\treturn \"\"\n\t}\n\tif currentContext, ok := cfg.Contexts[cfg.CurrentContext]; ok {\n\t\treturn currentContext.Namespace\n\t}\n\treturn \"default\"\n}", "title": "" }, { "docid": "51058c5840958af65103b445220868a3", "score": "0.6473534", "text": "func GetWatchNamespace() (string, error) {\n\tns, found := os.LookupEnv(WatchNamespaceEnvVar)\n\tif !found {\n\t\treturn \"\", fmt.Errorf(\"%s must be set\", WatchNamespaceEnvVar)\n\t}\n\treturn ns, nil\n}", "title": "" }, { "docid": "51058c5840958af65103b445220868a3", "score": "0.6473534", "text": "func GetWatchNamespace() (string, error) {\n\tns, found := os.LookupEnv(WatchNamespaceEnvVar)\n\tif !found {\n\t\treturn \"\", fmt.Errorf(\"%s must be set\", WatchNamespaceEnvVar)\n\t}\n\treturn ns, nil\n}", "title": "" }, { "docid": "0d9d1263cae360e6c9ce071b0db4c475", "score": "0.6462629", "text": "func GetNamespace() string {\n\treturn path.Base(reflect.TypeOf(WishCashPaymentWorkflow{}).PkgPath())\n}", "title": "" }, { "docid": "8a325c3a4ec199a827ee9a70652d5292", "score": "0.64617044", "text": "func getNamespace(ctx context.Context, client objectstorage.ObjectStorageClient) (string, error) {\n\trequest := objectstorage.GetNamespaceRequest{}\n\tresponse, err := client.GetNamespace(ctx, request)\n\tif err != nil {\n\t\treturn *response.Value, fmt.Errorf(\"failed to retrieve tenancy namespace : %w\", err)\n\t}\n\n\treturn *response.Value, nil\n}", "title": "" }, { "docid": "3351f3838bc0bf01a11fd29c00ede293", "score": "0.6423241", "text": "func GetNamespace() string {\n\treturn string(MustAsset(\"builtin/namespace.yaml\"))\n}", "title": "" }, { "docid": "92b86677d4fc288b63b8ee33583717bc", "score": "0.64113754", "text": "func GetWatchNamespace() (string, error) {\n\tns, found := os.LookupEnv(WatchNamespaceEnvVar)\n\tif !found {\n\t\treturn \"\", fmt.Errorf(\"%s must be set\", WatchNamespaceEnvVar)\n\t}\n\tif len(ns) == 0 {\n\t\treturn \"\", fmt.Errorf(\"%s must not be empty\", WatchNamespaceEnvVar)\n\t}\n\treturn ns, nil\n}", "title": "" }, { "docid": "620167c789269275c822b60d731d863e", "score": "0.64040196", "text": "func (c *KubernetesClients) CurrentNamespace() (string, error) {\n\tnamespace, _, err := c.ClientConfig.Namespace()\n\treturn namespace, err\n}", "title": "" }, { "docid": "dd3534b9fb766009031aa33477bf40f1", "score": "0.63720953", "text": "func (s *Sandbox) Namespace() string {\n\treturn s.namespace\n}", "title": "" }, { "docid": "80360c21be9cd62423d08fa9bbdbc971", "score": "0.63341075", "text": "func (m *MachineScope) Namespace() string {\n\treturn m.HcloudMachine.Namespace\n}", "title": "" }, { "docid": "ba52d070878b9e4bdc38d44b49f5f25c", "score": "0.63315576", "text": "func (m *MachinePoolScope) Namespace() string {\n\treturn m.AWSMachinePool.Namespace\n}", "title": "" }, { "docid": "fd6d09a041cf260b1d6b9aa2c48cf7e2", "score": "0.6321656", "text": "func (m *MachineScope) Namespace() string {\n\treturn m.PacketMachine.Namespace\n}", "title": "" }, { "docid": "aa8a86e29388c9b2f1758c72d03c9986", "score": "0.6316677", "text": "func (c *KubernetesCluster) CurrentNamespace() (string, error) {\n\tnamespace, _, err := c.clientconfig.Namespace()\n\n\treturn namespace, err\n}", "title": "" }, { "docid": "1937f7b2c67fed5e9e5bc997fdba47e0", "score": "0.6247718", "text": "func getOriginNamespace(cmd *cobra.Command) string {\n\tresult := kapi.NamespaceDefault\n\tif ns := kubecmd.GetFlagString(cmd, \"namespace\"); len(ns) > 0 {\n\t\tresult = ns\n\t\tglog.V(2).Infof(\"Using namespace from -ns flag\")\n\t} else {\n\t\tnsPath := kubecmd.GetFlagString(cmd, \"ns-path\")\n\t\tnsInfo, err := kubectl.LoadNamespaceInfo(nsPath)\n\t\tif err != nil {\n\t\t\tglog.Fatalf(\"Error loading current namespace: %v\", err)\n\t\t}\n\t\tresult = nsInfo.Namespace\n\t}\n\tglog.V(2).Infof(\"Using namespace %s\", result)\n\treturn result\n\n}", "title": "" }, { "docid": "30de3afceb6d4a8772427df7ee338595", "score": "0.62463886", "text": "func GetOperatorNamespace() (string, error) {\n\tenvVarOperatorNamespace := \"OPERATOR_NAMESPACE\"\n\tns, found := os.LookupEnv(envVarOperatorNamespace)\n\tif !found {\n\t\treturn \"\", fmt.Errorf(\"%s must be set\", envVarOperatorNamespace)\n\t}\n\treturn ns, nil\n}", "title": "" }, { "docid": "b7d818d70f4c3fecc7769177804491e6", "score": "0.6232", "text": "func GetNamespace() string {\n\trand.Seed(time.Now().UnixNano())\n\treturn fmt.Sprintf(\"x-%d\", rand.Intn(1e5))\n}", "title": "" }, { "docid": "08f2687c65dc828b1c8389560f589375", "score": "0.62174463", "text": "func (f *Framework) Namespace() string {\n\treturn f.namespace\n}", "title": "" }, { "docid": "f24bbb4b1e4e47b095f85ef344cf355b", "score": "0.6212567", "text": "func Namespace() string {\n\t// This way assumes you've set the POD_NAMESPACE environment variable using the downward API.\n\t// This check has to be done first for backwards compatibility with the way InClusterConfig was originally set up\n\tif ns, ok := os.LookupEnv(\"POD_NAMESPACE\"); ok {\n\t\treturn ns\n\t}\n\n\t// Fall back to the namespace associated with the service account token, if available\n\tif data, err := ioutil.ReadFile(\"/var/run/secrets/kubernetes.io/serviceaccount/namespace\"); err == nil {\n\t\tif ns := strings.TrimSpace(string(data)); len(ns) > 0 {\n\t\t\treturn ns\n\t\t}\n\t}\n\n\treturn \"default\"\n}", "title": "" }, { "docid": "b90ce6cfe3365bbc26c5c4fbdba58082", "score": "0.62089896", "text": "func (d *Deployment) Namespace() string {\n\treturn d.currentObject.Namespace\n}", "title": "" }, { "docid": "6130dec5181718df71c6f02345f469e7", "score": "0.61944145", "text": "func (d *Factory) GetNamespace() string {\n\tr := d.GetKustomizeResource()\n\treturn r.GetNamespace()\n}", "title": "" }, { "docid": "d1a6a4f6cbcf3324d287e1f8afa8a582", "score": "0.6180911", "text": "func GetNamespace() string {\n\treturn tmConfig.TestMachinery.Namespace\n}", "title": "" }, { "docid": "d38da431eb97455079490bef2d6808c9", "score": "0.61507785", "text": "func (k *Client) Namespace() string {\n\tns, err := k.config.CurrentNamespace()\n\tif err != nil {\n\t\treturn \"\"\n\t}\n\treturn ns\n}", "title": "" }, { "docid": "d7593789f9c674ec5b380f189db63cce", "score": "0.6122469", "text": "func getTargetNamespace() string {\n\ttargetNamespace := os.Getenv(\"KUBE_NAMESPACE\")\n\tif targetNamespace != \"\" {\n\t\treturn targetNamespace\n\t}\n\treturn defaultNamespace\n\n}", "title": "" }, { "docid": "7853fe06f8b8210ff3fc319db95dc830", "score": "0.6117639", "text": "func getNamespacesFromEnv() []string {\n\tnamespaceEnvVar := os.Getenv(\"NAMESPACE\")\n\tif namespaceEnvVar == \"\" {\n\t\tdefaultNs := os.Getenv(\"PGO_OPERATOR_NAMESPACE\")\n\t\treturn []string{defaultNs}\n\t}\n\treturn strings.Split(namespaceEnvVar, \",\")\n}", "title": "" }, { "docid": "e08c199196c2f776f28a1f980b987027", "score": "0.60969824", "text": "func GetOperatorNamespace() (string, error) {\n\tif isRunModeLocal() {\n\t\treturn \"\", ErrRunLocal\n\t}\n\tnsBytes, err := os.ReadFile(\"/var/run/secrets/kubernetes.io/serviceaccount/namespace\")\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn \"\", ErrNoNamespace\n\t\t}\n\t\treturn \"\", err\n\t}\n\tns := strings.TrimSpace(string(nsBytes))\n\tlog.V(1).Info(\"Found namespace\", \"Namespace\", ns)\n\treturn ns, nil\n}", "title": "" }, { "docid": "1f2e081c08b0168c922bd886168d2b1b", "score": "0.6087352", "text": "func getNamespace(ctx context.Context) string {\n\ttoken := goajwt.ContextJWT(ctx)\n\tif claims, ok := token.Claims.(jwt.MapClaims); ok {\n\t\temail := claims[\"preferred_username\"].(string)\n\t\treturn strings.Replace(strings.Split(email, \"@\")[0], \".\", \"-\", -1) + \"-che\"\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "34c60122885e9de05a73fc2b67537857", "score": "0.60637784", "text": "func GetVMOpNamespaceFromEnv() (string, error) {\n\tvmopNamespace, vmopNamespaceExists := os.LookupEnv(VmopNamespaceEnv)\n\tif !vmopNamespaceExists {\n\t\treturn \"\", fmt.Errorf(\"VM Operator namespace envvar %s is not set\", VmopNamespaceEnv)\n\t}\n\treturn vmopNamespace, nil\n}", "title": "" }, { "docid": "b6df489d7bb8aba2586bc7bd0875d347", "score": "0.6035453", "text": "func GetNamespace(command string) string {\n\tvar position int = strings.Index(command, \" \")\n\tif position == -1 {\n\t\treturn command\n\t}\n\treturn command[0:position]\n}", "title": "" }, { "docid": "05fb34bec2fa4e0d624f4e16af47eec6", "score": "0.60208154", "text": "func (i Ingress) GetNamespace() string {\n\tif i.V1 != nil {\n\t\treturn i.V1.Namespace\n\t}\n\treturn i.V1Beta1.Namespace\n}", "title": "" }, { "docid": "112dc890d0b1326056d8de4cee63aa10", "score": "0.6012872", "text": "func (cl *knServingGitOpsClient) Namespace() string {\n\treturn cl.namespace\n}", "title": "" }, { "docid": "fdcddbac25ca916f35edd61f1327016f", "score": "0.598559", "text": "func Namespace() string {\n\tfileName := os.Getenv(\"NS_FILE\")\n\tif fileName == \"\" {\n\t\tfileName = defaultNSFile\n\t}\n\n\tbuf, err := ioutil.ReadFile(fileName)\n\tif err != nil {\n\t\tlog.Fatalf(\"ERROR reading namespace file at '%s': %s\\n\", fileName, err)\n\t}\n\n\treturn string(buf)\n}", "title": "" }, { "docid": "bfdf1f82f58f39082f9bbe98d03b5cca", "score": "0.59821457", "text": "func TeamNameSpace() string {\n\tns := os.Getenv(namespaceKey)\n\tif ns == \"\" {\n\t\tns = defaultNameSpace\n\t}\n\tlogger.Infof(\"Using namespace %s\", ns)\n\treturn ns\n}", "title": "" }, { "docid": "b3f1c14420094ba2fbc393b389ce6c39", "score": "0.5972611", "text": "func (s *EnvSettings) Namespace() string {\n\tif ns, _, err := s.config.ToRawKubeConfigLoader().Namespace(); err == nil {\n\t\treturn ns\n\t}\n\treturn \"default\"\n}", "title": "" }, { "docid": "b3f1c14420094ba2fbc393b389ce6c39", "score": "0.5972611", "text": "func (s *EnvSettings) Namespace() string {\n\tif ns, _, err := s.config.ToRawKubeConfigLoader().Namespace(); err == nil {\n\t\treturn ns\n\t}\n\treturn \"default\"\n}", "title": "" }, { "docid": "d2db89f16b8a220880c5dd354c5708ce", "score": "0.59707063", "text": "func (e *Event) GetNamespace() string{\n\treturn e.namespace\n}", "title": "" }, { "docid": "db045f1b8c2b886a1818ef005a4d4333", "score": "0.5959308", "text": "func (s *Scope) Namespace() string {\n\treturn s.Cluster.Namespace\n}", "title": "" }, { "docid": "e5926a3309a34dbb3455d956f08d74a1", "score": "0.59586483", "text": "func (meta *ObjectMeta) GetNamespace() string { return meta.Namespace }", "title": "" }, { "docid": "36a5a36cffc3b65c3d69d12881b32ed4", "score": "0.5948115", "text": "func getK8Namespace()(string, error){\n\treturn k8sutil.GetWatchNamespace()\n}", "title": "" }, { "docid": "a0d0a7a326105c3445595daa2a3701d1", "score": "0.5939603", "text": "func GetNamespace(namespaceArgument string) string {\n\n\t// if the namespace was passed in the arguments, use that\n\tif namespaceArgument != \"\" {\n\t\treturn namespaceArgument\n\t}\n\n\t// if the namespace exists in env, use that\n\tif namespaceEnv := os.Getenv(\"SCALER_NAMESPACE\"); namespaceEnv != \"\" {\n\t\treturn namespaceEnv\n\t}\n\n\t// get namespace from within the pod. if found, return that\n\tif namespacePod, err := os.ReadFile(\"/var/run/secrets/kubernetes.io/serviceaccount/namespace\"); err == nil {\n\t\treturn string(namespacePod)\n\t}\n\n\treturn \"default\"\n}", "title": "" }, { "docid": "0b7a5033e8c19b10a363f37ab865d853", "score": "0.59394264", "text": "func (ce CertificateEd25519V1) GetNamespace() string {\n\treturn Namespace\n}", "title": "" }, { "docid": "f18bb60f689e711b4c60a6ef462859db", "score": "0.59281415", "text": "func (o *SparseAlarm) GetNamespace() (out string) {\n\n\tif o.Namespace == nil {\n\t\treturn\n\t}\n\n\treturn *o.Namespace\n}", "title": "" }, { "docid": "76a4e1070e4c2a6ef4f7e0249691e893", "score": "0.5924738", "text": "func (a Application) Namespace() string {\n\treturn DefaultNamespace\n}", "title": "" }, { "docid": "f0269b9a33882ed78f54ea7af818d3f7", "score": "0.59194756", "text": "func (m *mockServer) GetNamespace() string {\n\treturn \"testNamespace\"\n}", "title": "" }, { "docid": "57182648e9cca074ad91a102041d55f3", "score": "0.5916887", "text": "func (w *Widget) GetEnv() string {\n\tif w == nil || w.Env == nil {\n\t\treturn \"\"\n\t}\n\treturn *w.Env\n}", "title": "" }, { "docid": "63eab021561aba9bea907f58d70ab0fe", "score": "0.59059626", "text": "func GetEnvironment() string {\n\treturn env\n}", "title": "" }, { "docid": "fb0e66c1971989021fb8ba62894ebd30", "score": "0.58869815", "text": "func (c *MockKnServingClient) Namespace() string {\n\treturn c.recorder.r.Namespace()\n}", "title": "" }, { "docid": "9e526be8f7b3badfe432fb60211b81d4", "score": "0.58812076", "text": "func GetScope() (string, error) {\n\tif UserDefinedScope != \"\" {\n\t\treturn UserDefinedScope, nil\n\t}\n\tif len(ginkgoconfig.GinkgoConfig.FocusStrings) == 0 {\n\t\treturn \"\", errors.New(\"Scope cannot be set\")\n\t}\n\n\tfocusString := strings.TrimSpace(strings.ToLower(ginkgoconfig.GinkgoConfig.FocusStrings[0]))\n\tswitch {\n\tcase strings.HasPrefix(focusString, \"run\"):\n\t\treturn Runtime, nil\n\tcase strings.HasPrefix(focusString, K8s):\n\t\treturn K8s, nil\n\tdefault:\n\t\treturn \"\", errors.New(\"Scope cannot be set\")\n\t}\n}", "title": "" }, { "docid": "9648956f2a6b436a6b7286caf14f10c2", "score": "0.5873986", "text": "func (k Key) BaseNamespace() string {\n\tn := k.Namespaces()\n\treturn n[len(n)-1]\n}", "title": "" }, { "docid": "e5a16cd88cba97f02fbbbb73d6ad64de", "score": "0.5871124", "text": "func (c *Context) Env() string {\n\treturn c.env\n}", "title": "" }, { "docid": "4be49d02af3c1222c9e925ca9a12cb30", "score": "0.585305", "text": "func ContextNamespace(ctx context.Context) string {\n\tif value := ctx.Value(NamespaceKey); value != nil {\n\t\treturn value.(string)\n\t}\n\treturn \"\"\n}", "title": "" }, { "docid": "9c095c221a24f200d6874d928687a71c", "score": "0.58506376", "text": "func (n name) Namespace() string {\n\treturn n.space\n}", "title": "" }, { "docid": "d9b0bb0535b0be313962425ca8f74017", "score": "0.5843834", "text": "func (s *ClusterScope) Namespace() string {\n\treturn s.Cluster.Namespace\n}", "title": "" }, { "docid": "d9b0bb0535b0be313962425ca8f74017", "score": "0.5843834", "text": "func (s *ClusterScope) Namespace() string {\n\treturn s.Cluster.Namespace\n}", "title": "" }, { "docid": "e745a6e0d2152b8fff5d93d29e4e6f6b", "score": "0.58267444", "text": "func (s *Source) GetNamespace() string { return s.Namespace }", "title": "" }, { "docid": "ec411d901df30ac6629377b96cb2aee1", "score": "0.5825073", "text": "func getCurrentNS() (netns.NsHandle, error) {\n\t// Lock the thread in case other goroutine executes in it and changes its\n\t// network namespace after getCurrentThreadNetNSPath(), otherwise it might\n\t// return an unexpected network namespace.\n\truntime.LockOSThread()\n\tdefer runtime.UnlockOSThread()\n\treturn netns.Get()\n}", "title": "" }, { "docid": "9ab0e581d37e33abb45f518be76348a1", "score": "0.58141667", "text": "func (p *DBaaSReconciler) getInstallNamespace() (string, error) {\n\t// installNamespaceEnvVar is the constant for env variable INSTALL_NAMESPACE\n\tvar installNamespaceEnvVar = \"INSTALL_NAMESPACE\"\n\n\tns, found := os.LookupEnv(installNamespaceEnvVar)\n\tif !found {\n\t\treturn \"\", fmt.Errorf(\"%s must be set\", installNamespaceEnvVar)\n\t}\n\treturn ns, nil\n}", "title": "" }, { "docid": "05539f20bc1dd1b9ee25edfa169268eb", "score": "0.5811722", "text": "func (p *ClusterServicePlan) GetNamespace() string {\n\treturn \"\"\n}", "title": "" }, { "docid": "ed80f3395b9d19a319cb291f64af8d35", "score": "0.5810403", "text": "func GetWatchNamespace() (string, error) {\n\treturn k8s.GetWatchNamespace()\n}", "title": "" }, { "docid": "bc706a04dcd1a9b004763a8f1a4a3367", "score": "0.58094054", "text": "func (id StandardComponents) Namespace() string {\n\treturn id.namespace\n}", "title": "" }, { "docid": "5cb50af3e36d9ac0fb0af82ed07f5fc8", "score": "0.58056664", "text": "func getNamespaceFromMetadata(metadata map[string]interface{}) string {\n\tif namespaceTemp, ok := metadata[common.SessionNameSpaceKey]; ok {\n\t\tif v, ok := namespaceTemp.(string); ok {\n\t\t\treturn v\n\t\t}\n\t}\n\treturn common.SessionNameSpaceDefaultValue\n}", "title": "" }, { "docid": "eca65899e72600026d64bb8ff088b8b7", "score": "0.5781852", "text": "func (c *namespaceCommand) getNamespace(ctx context.Context, ref string) (*model.Namespace, error) {\n\tuseIDs, err := c.config.UseIDs()\n\tif err != nil {\n\t\treturn nil, err\n\t}\n\n\tif !useIDs {\n\t\treturn c.client.GetNamespaceByName(ctx, ref)\n\t}\n\n\tuid := id.Namespace(ref)\n\treturn c.client.GetNamespace(ctx, uid)\n}", "title": "" }, { "docid": "ea2aa0bc895b7cd395d1e0237e6542c0", "score": "0.5776713", "text": "func (e TknRunner) TknNamespace() string {\n\treturn e.namespace\n}", "title": "" }, { "docid": "de74691294175ec8e2d12d63f7a31df7", "score": "0.5775305", "text": "func (t *Tree) GetNamespace() string {\n\treturn t.namespace\n}", "title": "" }, { "docid": "0691b7d5e1e9e58051138c3f97f75d95", "score": "0.5773578", "text": "func (m Metadata) Namespace() string { return Map(m).GetString(\"namespace\") }", "title": "" }, { "docid": "ec07fe3548c786276d7fbe59468b235a", "score": "0.5750958", "text": "func GetK8sCurrentContext() (string, error) {\n\tcmd := exec.Command(\"kubectl\", \"config\", \"current-context\")\n\tout, err := cmd.CombinedOutput()\n\tlog.Printf(\"kubectl current context: %s\", string(out))\n\tif err != nil {\n\t\tlog.Print(\"kubectl command execution\", err)\n\t\treturn \"\", err\n\t}\n\treturn string(out), nil\n}", "title": "" }, { "docid": "b6669a32d356622c6660ca5f56b63f94", "score": "0.5744027", "text": "func (s *Scheduler) Namespace() string {\n\tif s.cfg.Namespace != \"\" {\n\t\treturn s.cfg.Namespace\n\t}\n\n\t// Figure out which namespace we are running in\n\tpods, err := s.client.Core().Pods(\"\").List(v1.ListOptions{\n\t\tFieldSelector: fmt.Sprintf(\"metadata.name=%s\", s.cfg.ContainerName),\n\t})\n\tif err != nil {\n\t\tlogrus.Fatal(err)\n\t}\n\tif len(pods.Items) == 0 {\n\t\tlogrus.Fatal(errors.New(\"Failed to find pod namespace. Are you sure you are running kronjob inside a kubernetes container?\"))\n\t}\n\n\ts.cfg.Namespace = pods.Items[0].Namespace\n\n\treturn s.cfg.Namespace\n}", "title": "" }, { "docid": "375ce68b288d8c070e49d54c39d210af", "score": "0.5720834", "text": "func getNamespaceIsolator(pod *schema.PodManifest) *kschema.LinuxNamespaces {\n\tfor _, iso := range pod.Isolators {\n\t\tif iso.Name.String() == kschema.LinuxNamespacesName {\n\t\t\tif niso, ok := iso.Value().(*kschema.LinuxNamespaces); ok {\n\t\t\t\treturn niso\n\t\t\t}\n\t\t}\n\t}\n\treturn nil\n}", "title": "" }, { "docid": "11a4cf4476d1c85b1deec5b5a53e8601", "score": "0.57110655", "text": "func (k *KfSource) GetNamespace() string {\n\treturn k.Namespace\n}", "title": "" }, { "docid": "f906ebb3fb70c51fd54041628caf6d5a", "score": "0.5710337", "text": "func (cl *knServingClient) Namespace() string {\n\treturn cl.namespace\n}", "title": "" }, { "docid": "d5c5fada92b3726151562103989816c0", "score": "0.57081074", "text": "func (o AuthBackendClientOutput) Namespace() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *AuthBackendClient) pulumi.StringPtrOutput { return v.Namespace }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "c7dbcd69571a3fe1b0e07596193e5411", "score": "0.5707034", "text": "func getISTagNamespace(ref reference.DockerImageReference) string {\n\tif ref.Namespace != \"\" {\n\t\treturn ref.Namespace\n\t}\n\treturn common.GetComplianceOperatorNamespace()\n}", "title": "" }, { "docid": "ee8829406673fb445ffa7fa12f9ce856", "score": "0.57033604", "text": "func GetOperatorNamespace() (string, error) {\n\tnsBytes, err := ioutil.ReadFile(\"/var/run/secrets/kubernetes.io/serviceaccount/namespace\")\n\tif err != nil {\n\t\tif os.IsNotExist(err) {\n\t\t\treturn \"\", ErrNoNamespace\n\t\t}\n\t\treturn \"\", err\n\t}\n\tns := strings.TrimSpace(string(nsBytes))\n\tlog.V(1).Info(\"Found namespace\", \"Namespace\", ns)\n\treturn ns, nil\n}", "title": "" }, { "docid": "b66aaba47c9a42b81cfe05e4149d78c4", "score": "0.57001865", "text": "func (e *Endpoint) Namespace() string {\n\tep := strings.Split(e.Name, \".\")\n\treturn utils.NameToGo(ep[0])\n}", "title": "" }, { "docid": "e0580f35c3be4543d6d47753443f1ad6", "score": "0.568313", "text": "func getInClusterNamespace() string {\n\tif ns := os.Getenv(\"POD_NAMESPACE\"); ns != \"\" {\n\t\treturn ns\n\t}\n\n\t// Fall back to the namespace associated with the service account token, if available\n\tif data, err := ioutil.ReadFile(\"/var/run/secrets/kubernetes.io/serviceaccount/namespace\"); err == nil {\n\t\tif ns := strings.TrimSpace(string(data)); len(ns) > 0 {\n\t\t\treturn ns\n\t\t}\n\t}\n\n\treturn \"default\"\n}", "title": "" }, { "docid": "c4a34d7d23627f7f4012ba7afecb1bf3", "score": "0.5665628", "text": "func (o ApplicationStatusOperationStateOperationSyncSourceKsonnetPtrOutput) Environment() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v *ApplicationStatusOperationStateOperationSyncSourceKsonnet) *string {\n\t\tif v == nil {\n\t\t\treturn nil\n\t\t}\n\t\treturn v.Environment\n\t}).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "49c3bc4d310183392de102882fe1de75", "score": "0.5654922", "text": "func (r Resource) GetNamespace() string {\n\tif r.Namespace == \"\" {\n\t\treturn \"kube\"\n\t}\n\tif r.Namespace == \"_\" {\n\t\treturn \"\"\n\t}\n\treturn r.Namespace\n}", "title": "" }, { "docid": "6ad1172e9401131073fc97146267b4d0", "score": "0.5652559", "text": "func (opts GetOptions) Namespace() string {\n\treturn opts.toConfig().Namespace\n}", "title": "" }, { "docid": "f502443949eeef27e6e7a04d2d55300f", "score": "0.56419206", "text": "func (o ApplicationStatusOperationStateOperationSyncSourceKsonnetOutput) Environment() pulumi.StringPtrOutput {\n\treturn o.ApplyT(func(v ApplicationStatusOperationStateOperationSyncSourceKsonnet) *string { return v.Environment }).(pulumi.StringPtrOutput)\n}", "title": "" }, { "docid": "d4afadcafc110663c3c2fe3191b9a28d", "score": "0.56408733", "text": "func Getenv() map[string]string {\n\treturn map[string]string{\n\t\t\"namespace\": os.Getenv(\"NAMESPACE\"),\n\t\t\"resourceName\": os.Getenv(\"APPLICATION_NAME\"),\n\t}\n}", "title": "" }, { "docid": "963a8b7917c7ca1125018afb3db2ab45", "score": "0.56374925", "text": "func GetNamespace(name string) *Namespace {\n\treturn namespaces.Get(name)\n}", "title": "" }, { "docid": "b78e25ba10facfbda229555bf5bd3869", "score": "0.56314987", "text": "func GetPodNamespace() string {\n\tns, found := os.LookupEnv(\"POD_NAMESPACE\")\n\tif !found {\n\t\treturn \"keda\"\n\t}\n\treturn ns\n}", "title": "" }, { "docid": "5eec85632014121a14b64eaf58ad463f", "score": "0.5630543", "text": "func (p *ServicePlan) GetNamespace() string {\n\treturn p.Namespace\n}", "title": "" }, { "docid": "8d39f9a9daa41914dbe297c9a65f50cf", "score": "0.5625112", "text": "func (p *Pipeline) Namespaces() ([]component.Namespace, error) {\n\treturn p.cm.Namespaces(p.app, p.envName)\n}", "title": "" }, { "docid": "dcc6647c7bd90b6ba38dde1fbe8213e0", "score": "0.5621552", "text": "func (o *InternalIsOwnerForProjectBySlugBody) GetNamespace() string {\n\tif o == nil {\n\t\tvar ret string\n\t\treturn ret\n\t}\n\n\treturn o.Namespace\n}", "title": "" }, { "docid": "10e6f538a43601caf4920469a02e487e", "score": "0.56145376", "text": "func getNamespace(provider string) string {\n\treturn namespace + \".\" + provider + \".functions\"\n}", "title": "" } ]